Skip to main content

Full text of "RESTRICTED DOCUMENT Heavy National Security"

See other formats


President Eisenhower said to 2 CIA Officers, in the Oval Office : 
" —We called the people in from MJ-12, from Area 51 and S-4, 
but they told us that the government had no 
jurisdiction over what they were doing... 
| want you and your boss to fly out there. 
| want you to give them a personal message... 
| want you to tell them, whoever is in charge, 
| want you to tell them, that they have this coming week to get 
into Washington, and to report to me. 

And if they don't, l'm going to get the First Army from Colorado, 
we are going to go over and take the base over. 
| don't care what kind of classified material you got. 

We are going to rip this thing apart." 


š 


w 
* 
.. 
“ee 
` 
ё 


“ ...: о Фи 7 ‚ +» № . 


A LOT OF SHIT IN SPACE ABOVE AND AROUND 05. ^ .. 
—1 THINK I CAN COUNT TO 3000 RF SATELLITES. j". 


. 
E mE = 
, 
. 


r : | ы 
Фе...” « " E Ее ‘ Je 2 . 

. * ' oot - , | а er 
ж e Е Д ° - , L] А A "^ » . 4 
е a“ 4 .. " ° : re `. е АЖ е”, 
* ч è ... . . 6 

2 Y а“ * 2 y^. k 
. , > , . 
. E . » 
` - ы 
" . 


Ф “ 
`... 


. . 
-. 
в” 4 . 


^ я 
e" $> Va. > 


Ж, 


INTRODUCTION. 
14 - START READING RIGHT HERE. 


PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 


15 
16 
17 


126 
127 
146 
150 
154 
157 
159 
294 
300 
303 
315 
325 
327 
329 
330 
341 
361 
371 
374 
464 
504 
508 
528 
530 
574 
576 
581 


EXTRAS: 


PAGE 
PAGE 


FHH 


583 
612 


THE ROSWELL COVER-UP PART 2. PART ONE CAN BE READ LATER IN THIS DOCUMENT. 

ROSWELL NEWSPAPER FRONTPAGE FROM 08 JULY 1947. 

PHOTOGRAPHS OF EXRATERRESTRIAL (E.T.) DEAD BODY ON AMERICAN MILITARY AUTOPSY TABLE. 3 PHOTOS INCLUDING ONE ON IT'S BRAIN. 

NEWLY ELECTED PRESIDENTS UFO BRIEFING DOCUMENTS FROM 18 NOVEMBER 1952. PAGE 20-26. *** 

SHORT DESCRIPTIONS AND MY OWN PERSONAL PHOTOS OF DWIGHT D. EISENHOWER, HARRY S. TRUMAN, VANNEVAR BUSH, JAMES FORRESTAL AND MJ-1 HILLENKOETTER. 

TAGGED AND BROKEN I-BEAM OF EXTRATERRESTRIAL UNKNOWN MATERIAL WITH HIEROGLYPHS. THE I-BEAM HAS A LIGHT-PURPLE COLOR. 

DEAD ALIEN ON AUTOPSY TABLE. 

THE REAL USA GOVERNMENT COUNTERSTRIKE UFO MANUAL - "EXTRATERRESTRIAL ENTITIES AND TECHNOLOGY, RECOVERY AND DISPOSAL" - PRINTED 1954. AND LAST EDIT IN IT ARE FROM 1957. *** 
ALIEN INSCRIPTIONS - SKETCH MADE BY JESSE MARCEL JUNIOR IN 1989 SHOWING THE ENGRAVED SYMBOLS FROM A SPACESHIP I-BEAM. 

ALIEN INSCRIPTIONS - HAVE THE ROSWELL U.F.O. DEBRIS SYMBOLS BEEN DECIPHERED. SHORT BACKGROUND. 

ALIEN INSCRIPTIONS - NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS WHEN A U.S. ARMY OFFICER HOLDS THE I-BEAM. 

ALIEN INSCRIPTIONS - NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS THE I-BEAM WITH IT'S CORRECT ITEM TAG. 

NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS SPACESHIP CONTROLS FOR 6-FINGER HANDS. 

INFORMATION ON THE AREA 51 S4 FACILITY BASED ON 3 PERSONS WHO CLAIMS THAT THEY HAVE WORKED THERE. 

INFORMATION ON THE DULCE MILITARY DNA FACILITY THAT CROSSBREEDS ANIMALS AND HUMANS. BASED MOSTLY ON 2 PERSONS WHO HAVE CLAIMED TO WORKED THERE. ONE HAS GONE MISSING INCLUDING HIS WHOLE FAMILY. 
THE PHOTO SECTION IN THIS SWEDISH REPORT. SEE THE FIRST PHOTO OF A 6-FINGERED EXTRATERRESTRIAL INDIVIDUAL. 

HOW CAN YOU PLACE "AN OBJECT OR FLUID ON THE OTHER SIDE" - AND EXACTLY WHAT IS "THE SNAKE" MENTIONED IN THE HOLY BIBLE, OR "THE SERPENTS" ANCIENT CIVILISATIONS SPOKE OF. 
THE PHOTO SECTION CONTINUES WITH MORE PHOTO'S, MAPS, SATELLITE IMAGES AND TECHNICAL DATA. THE FIRST IMAGE SHOWS A CUBAN AIRPORT WITH ALIEN SPACESHIP LANDING MARKINGS. 
ROSWELL DISPATCH NEWSPAPER FRONTPAGE FROM 09 JULY 1947. 

EXTRATERRESTRIAL ALIEN POETRY AND WISDOM. 

PHOTO OF SOME KIND OF "E.T. WEAPON". Obviously, one can determine that the electric lighting comes from the beam pointed down. The picture is real and not photoshopped. 
DIFFERENT RADAR DESCRIPTIONS. PRIMARY AND SECONDARY RADAR SCREENS. 

UNITED STATES PATENTS ABOUT BRAINWAVES AND REMOTE ANTENNA MINDCONTROL. 

UNITED STATES ACTIVE DENIAL TRUCKS. PUBLIC EXPLANATION ARE BURNING SKIN GROUP CONTROL. BUT ACTIVE DENIAL CAN SUPPRESS THOUGHTS SO SOME DECISIONS BECOME IMPOSSIBLE TO PERFORM. 
OUR OWN FEDERAL AVIATION ADMINISTRATIONS AIR TRAFFIC SURVEILLANCE - THAT E.T. TAPPED IN TO, OR HAVE SYSTEM ACCESS TO. THEY KNOW WHERE ALL OUR AIRCRAFT ARE - WHEN FAKING A AIRPORT. 
RADIO AND ELECTRO MAGNETIC RADIATION SAFETY LEVELS. 

EMF AND RF SAFETY LEVELS - A COMPARATIVE GUIDE. 

NOT FOR PUBLIC INSPECTION. ONE PAGE DOCUMENT FRAGMENT. 

TWO PAGE DOCUMENT THAT MENTION PROFESSOR ALBERT EINSTEIN AS THE PROJECT JEHOVA DIRECTOR. [Document found in John Foster Dulles security safe. ] 

PHOTO OF JOHN FOSTER DULLES. [He served as United States Secretary of State under President Eisenhower 1953-1959.] 

CLEAN WRITING OF THE ABOVE TWO PAGE DOCUMENT. [Document from above that was found in John Foster Dulles security safe, now with clean text, and easier to read. ] 

MJ-12 TOP SECRET/MAJESTIC / THE FIFTH ANNUAL REPORT END CONCLUSION. THE REPORT ARE REAL U.S. GOVERNMENT PROPERTY. *** 

U.S. PATENT - APPARATUS FOR AUDIBLY COMMUNICATING SPEECH USING THE RADIO FREQUENCY HEARING EFFECT. 

WHAT ARE THE EXTRATERRESTRIALS DOING HERE *EXACTLY*. HERE IS A SHORT SUMMARY. THIS IS WHAT THEY DO, IF, THEY, THEORETICALLY, EXIST. 

PENTAGON AND THE U.S.A. DEFENSE BUDGET 2017-2018. INCLUDES DESCRIPTIONS OF ALMOST ALL WEAPON SYSTEMS AND THE AIR FORCE ONE. 

THE NSA COMPUTER NETWORK SECURITY GUIDE. MOST NSA SPY SERVERS ARE LISTED WITH THEIR OPERATING TCP/UDP PORTS. READ WHAT THE NATIONAL SECURITY AGENCY SAY YOU SHOULD BLOCK. 
CIA AND THE HAVANA SYNDROME. 

NEW PHOTO SECTION: MORE AREA 51 PHOTOS. 

TWICE THE SPEED OF LIGHT. 

ALL USA INTELLIGENCE AGENCIES BLACK BUDGETS 2013. 

BOKSTAVERINGSALFABETET. SWEDISH AND INTERNATIONAL. 

PHOTO ON U.F.O. CHASED BY THE U.S. MILITARY. 

AUTHORS IDENTIFICATION. 


CLEAN WRITING OF THE MJ-12 MANUAL. THESE PAGES ARE EASIER TO READ. 
A DIRECTIVE TO THE UNITED STATES COMMUNICATIONS AND INTELLIGENCE BOARD (USCIB). SUBJECT: COMMUNICATIONS INTELLIGENCE ACTIVITIES. WRITTEN 24:TH OCTOBER 1952. *** 


GO BACK TO PAGE 97 - AND IN THE PHOTO SECTION OF THIS REPORT // SEE THE DOCUMENT ABOUT MURDERING SECRETARY OF DEFENSE FORRESTAL THAT WISHED TO GO PUBLIC WITH U.F.O. 


First he was placed in a mental hospital, and then he was thrown out of a window there. 


Did they give him a poison before he went to the mental hospital? 


All pictures are real and not photoshopped. There are more than 100 photos and images herein. 


© SWEDISH DEEP INVESTIGATION MADE AND PRODUCED BY GUSTAV NORSTRÓM DATE 2023-03-24. 
Working on behalf of the Royal Kingdom of Sweden for all Governments worldwide. 


*** = ALL THE 1950"5 DOCUMENTS INDEXED ABOVE ARE REAL U.S. GOVERNMENT PROPERTY. 

I don't personally speculate in this REPORT, about the accuracy and written truths served to you from these 1950's documents. 

I only guarantee you that the old external documents published herein this SWEDISH PDF REPORT, are real U.S. GOVERNMENT PROPERTY from the 1950's. 
Educate yourself by reading these GOVERNMENT PAPERS. 


THE U.F.O. BASIC KNOWLEDGE 
ОМ THE GOVERNMENT TABLE 
BIBLE . 


Document: Heavy National Security PDF u 


This Portable Document File (PDF) was created during the 
United States Presidency Times, with Joe Biden as acting 
President. 


3 / 569 


The intelligence cycle. 


WILL BE acquired, and are then later converted into 


real intelligence. 


WHAT 15 INFORMATION? 
ПРОЕМА ТО Нева: may Бе fragmentary, contradictory, 


unreliable, ambiguous, deceptive, foreign or 


Ц 
completely wrongs Example: He bought a hat for € 288. 


А = E E 


The information is evaluated and analysed and often combined 
with other sources of information. 
Example HUMINT: He bought a * BLACK hat for € 288. 
Example SIGINT: *And he texted his father it was nice. 


NOW YOU HAVE YOURIRAW INTELLIGENCE 


INTELLIGENCE are information that has been 


collected, integrated, evaluated, analyzed and 


interpreted [correctly] . 
p Example: Mr. C bought a black hat he texted was nice and it was on sale for 


€ 288 Euro. A real bargain according to his fathers textreply the same day. 


THE FINAL PRODUCT OF THE INTELLIGENCE CYCLE. 


- Ready to be delivered to the topload and all the 
Government Departments and all it's Policymakers! 


Result = Every government employee wears black hats for € 288 Euro. 


шшш ТЕР 


\ 


9112. қ 


wil! 


нні" 


2 N 
| us dU 


aa 

E 
t — GR IM 
Ü 


Update on U.S. Government and Extraterrestrials. 


2023-02-03 CET 17:58. 


i 


4 / 569 


5/570 


— 


—_ 


Gustav Norstróm 


U.S. Department of Defense 


6 / 570 


5 / 569 


BA OIF SUH -RI E E4? 


$ L| > ОНЕ 2030 OHS) HIS CAI EA 4045 = 8/1009 961.27 2201 


6/569 Ж... 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


7 / 569 8/570 


«See rs. 


8 / 569 1/340 9/570 


YOU MUST START SOMEWHERE 


SO START RIGHT HERE: 


THE COVER-UP PART TWO. 


The ranch owner was picked up b о ranch, and aen to the house of the owner, of the local 
Roswell Radio Station, KGBL, to be interviewed. A recording of the interviewWas made, and the 
station planned to broadcast it the next morning. But before it could be broadcasted Brazel was 
taken into custody by members of the Military Ройсезапа his exclusive inte became 
confiscated. 


The Federal Соттипіса йе Commission (reporte le been through the of T.J. Slowie, 
Secretary of the Соттіз єп), warned radio statio el that the matter >d National 
"+ Security and should KGF any portion of the int ssue any informat arding it, they 


would lose their broad 


Sometime later Brazel showed up at KGFL Radio Station escorted by Military Officers,where he then 
told the "truth" about the debris found on his ranch. Brazel took back his initial story, instead 
claiming now, that he first found the debris in middle of June, in 1947, and NOT the morning of 
Saturday, July 5, in 1947, as he first told them. 

And that it was a simple weather balloon. 


The reasons for the cover-up by the Military, came via order from United States 
President, who wanted to avoid panic. A good comparison for understandment would 


be: Think that the Soviet Union was the first to posses the atomic bomb. 
Something like that. And these "visitors" can not be trusted.— AMEN! And GOOD LUCK! 


же 


п TA Р d t ^ ) г T = = 
АШАН This is МОТ a weather balloon. 
vation balloons on ‘he ranch. bu = = > 

at Doon ta found иа гадини, ey And this United States Army hand is not fake. 
not in any way rescmblie cither 
of these 

T am sure what I found was 


по, any weather observation 
balloon," һе sald. "But if I find 
anything else, besides а bomb, they 
are golng to Маус а hard 


gelling me to say anything abo 
B4 = 


10 / 569 11/570 


ny BER т ЗИ 
п н ' pun pu Пер ША пи e 

iim duced dg aa 
И И 


m ІШКІ a 


Ен р iti 1 


е И ел td rat ШИЕ 
MARO ЕРҒАТ н ШИН h БИ kme nus 
i lii Шы! {ЫНЫ ИШ] * | ШІ | 


ө Ri 1 "LE ДЕАШ " | чү Et Eu: ( қ НІМ i 
i ЛІ | lur quie ҮН h ШШ. ДШ, | ii br i 
| HET e ek 1 
Ш Пи Пия ще jl 
THE UO INTR Яп НЕГЕ u qt ih 7 
ШЕНЕ 6 | р 


g Saucer 


in Roswell Reg 


i tit 


lon 


в 
tz [ng Carol Weds Mme шеу» 


Roo Off. | 
-.. apo — 
із” 


in 
No Details of 
"4 Disk 
evealed 


Are 


| 1 ‚| iin P н ННІ ji ү Ir me p T 


P 


| Де 

spur: ip T Т 

|: Hr inii th ; i ae 
Г) D. 
f rp ҮЛ Г 


И "К ІІІ? 
а НЕШЕ ЧЕ Ши 
ша ра пи ENT 
р - Т үрге t "4. Үн 
инин И pi ҮТ ji си ар: m i 
Is: от mr 


ТЫП ИА ГЕШ. | : 
| vM C TC i БШ! \ 


Реми Way te Talks F| 
"о oes 


De Arms h. 


"Ram. 


slee а mom 
Comoe 
vom Tm 


RAAF Captures Fly 
On Ranch 
House Passes (ест?) (әкі 


Tax Slash by 
Large Margin 


LET 
^ 


Claims Army 
3 В Stacking 


mad (Courts Martial 


a 
E 
c 
w 
Q 

ва 

< 
= 
ға 
= 
< 
3 
т 
5 
"á 


it 


Some of Soviet Satellites 
May Afiend Paris Meeting 


irt НГ, 


Welcome to Planet Earth", 
Vintergatan. 


A translation would be: 
-Уа1котпа till Sverige! 
We know the most. 


14 / 570 


TOP SECRET / MAJIC Е 
МАТІ онаша са PN (Miu? ток 
47 Erie PILLS 


* TOP SECRET * 


РУТА, 


EYES ONLY COPY ONE OP СМЕ. 


BRIEFING DOCUMENT: OPERATION MAJESTIC 12 


PREPARED FOR PRESIDENT-ELECT DWIGHT D. EISENHOWER: (EYES ONLY) 


18 NOVEMBER, 1952 


WARNING: This is а TOP SECRET - EYES ONLY document containing 
compartmentalized information essential to the national security 
of the United States. EYES ONLY ACCESS to the matemial herein 
1s strictly limited to those possessing Majestiíc-12 clearance 
level, Reproduction in any form or the taking of written or 


~ mechanically transcribed notes 18 strictly forbidden. 


MASZIZIITTTTTI" 


ТОР:$ С Е/ MAJIC рев (е 
15 / 569 OPNS РЕ ONI Y 16V 570 


16 / 569 


TOP SECRET / MAJIC 092 
EYES..QNI-Y 


* TOP SECRET * 


s............. 


COPY ONE OF ONE. 
EYES ONLY ONE OF ONE 


SUBJECT: OPERATION MAJESTIC-12 PRELIMINARY BRIEFING FOR 
PRESIDENT-ELECT EISENHOWER. 


DOCUMENT PREPARED 18 NOVEMBER, 1952. 
BRIEFING OFFICER: ADM. ROSCOE H. HILLENKOETTER (м2-1) 


NOTE: This document has been prepared аз а рге11т1пагу briefing 
only. It should be regarded as introductory to & full operations 


briefing intended to follow. 


OPERATION MAJESTIC-12 is а TOP SECRET Research and Development/ 
Intelligence operation responsible directly and only to the 
President of the United States. Operations of the rk rs are 
carried out under control of the Majestic-12 (Majic-12) Group 
which was established by special classified executive order of 
President Truman on 24 September, 1947, upon recommendation by 

Dr. Vannevar Bush and Secretary James Forrestal. (See Attachment 
"д",) Members of the Majestic-12 Group were designated as follows: 


Adm, Roscoe H. Hillenkoetter 
ı Dr. Vannevar Bush 

Secy, James V. Porrestal* 

Gen, Nathan P. Twining 

Gen. Hoyt S. Vandenberg 

Dr. Detlev Bronk 

Dr. Jerome Hunsaker 

Mr, Sidney М. Souers 

Мг. Gordon Gray 

Dr. Donald Menzel 

беп. Robert M. Montague 

Dr. Lloyd V, Вегкпег 


Тһе death of Secretary Forrestal on 22 Мау, 1949, created 

а vacancy which remained unfilled until 01 August, 1950, upon 
which date Gen. Walter B. Smith was designated as permanent 
replacement. 


TOP SECRET FMASIC 
EYES OY! гүрс ОМУ MONI ae 


deb 4-3 
| TOP SECRET / MAJIC - 
 EXES..QNLY 


* TOP SECRET * 


Ф CETERE SEEE EEES] 


EYES ONLY COPY ONE OP ONE. 


On 24 June, 1947, а civilian pilot flying over the Cascade 
Mountains іп the State of Washington observed nine flyinz 
dise-shaped aircraft traveling in formation at а high rate 

of speed. Although this was not the first known sighting 

of such objects, 1% was the first to gain widespread attention 
in the public media. Hundreds of reports of sightings of 
similar objects followed. Many of these came from highly 
credible military and civilian sources. These reports res- 
ulted in independent efforts by several different elementa 

of the military to ascertain the nature and purpose of these 
objects іп the interests of national defense. А number of 
witnesses were interviewed and there were several unsuccessful 
attempts to utilize aircraft in efforts to pursue reported 
disos in flight. Public reaction bordered on near hysteria 


at times. 


In spite of these efforts, little of substance was learned 
е f | about the objecta until а local rancher reported that one 
80 had crashed in а remote region of New Mexico located approx- 
| imately seventy-five miles northwest of Roswell Army Air 
Base (now Walker Field). 


On 07 July, 1947, а secret operation was begun to assure 
recovery of the wreckage of this object for scientific study. 
During the course of this operation, aerial reconnaissance 
discovered that four small human-like beings had apparently 

' ejected from the craft at some point before it exploded. 
These had fallen to earth about two miles east of the wreckage 
site. All four were dead and badly decomposed due to action 
by predators and exposure to the elements during the approx- 
imately one week time period which had elapsed before their 
discovery. А special scientific team took charge of removing 
these bodies for study. (See Attachment "С".) The wreckage 
of the craft was also removed to several different locations. 
(See Attachment "B",) Civilian and military witnesses in 

the area were debriefed, and news reporters were given the 
effective cover story that the object had heen a misguided 
weather research balloon. 


сочена ае ÓEAEEEHE 


* TOP SECRET * 


SHAHN ER ¥ 4 


eves oux ГОР SECRET / MAJIC 
EYES ONLY - 


10 / 340 18 / 570 


T52-EXEMPT (E) 


17 / 569 


2-4 


TOP SECRET / MAJIC. 004 
EYES ONLY 


«оссовасеаттеяя 


% * TCP SECRET * 


вот ия яз 


EYES ONLY COPY ONE OP ONE. 


А covert analytical effort organized by Gen. Twining and 

Dr. Bush acting on the direct orders of the President, res- 
ulted in a preliminary concensus (19 September, 1947) that 
the disc was most likely а short range reconnaissance craft. 
This conclusion was based for the most part on the craft's 
size and the apparent lack of any identifiable provisioning. 
(See Attachment "D".) А similar analysis of the four dead 
occupants was arranged by Dr, Bronk. It was the tentative 
conclusion of this group (20 November, 1947) that althourh 
these creatures are human-like in appearance, the biological 
and evolutionary processes responsible for their development 
has anparently been quite different from those observed or 
postulated in homo-snpiens. Dr. Bronk's team has suggested 
the term "Extra-terrestrial Biological Entities", or "ENES", 
he adopted as the standard term of reference for these 
creatures until such time as a more definitive designation 


can be agreed upon. 


Since it is virtually certain that these craft do not origin- 
ate in any country on earth, considerable speculation has 
centered around what their point of origin might be and how 
they get here. Mars was and remains a possibility, although 
some scientists, most notably Dr. Menzel, consider it more 
likely that we are dealing with beings from another solar 
system entirely. 


Numerous examples of what appear to be a form of writing 
were found in the wreckage. Efforts to decipher these have 
remained largely unsuccessful. (See Attachment "Е".) 
Equally unsuccessful have been efforts to determine the 
method of propulsion or the nature or method of transmission 
of the power source involved. Research along these lines 
has been complicated by the complete nbsence of identifiable 
wings, propellers, jets, or other conventional methods of 
propulsion and guidance, as well аз а total lack of metallic 
wiring, vacuum tubes, or similar recognizable electronic 
components. (See Attachment "Р".) It ін assumed that the 
propulsion unit was completely destroyed by the explosion 
which caused the crash. 


К”) Wan... . h... ЕП 
* TOP SECRET * 


иона 


ms шш TOP SECRET / MAJIC текте) 
FYES ONLY 


18 / 569 340 19 / 570 


19 / 569 


A-5 
ТОР SECRET / М АЛС i 0 Û 
EYES ONLY 


* TOP SECRET * 


ERHRRREHE HR 


EYES ONLY COPY ONE OF ONE, 


A need for as much additional information ав possible about 
these craft, their performance characteristics and their 
purpose Jed to the undertaking known ав U.S. Air Force Project 
SIGN in Decemher, 1947. Іп order to preserve security, liason 
between SIGN and Majestic-12 was limited to two individuals 
within the Intelligence Division of Air Materiel Command whose 
role was to pass along certain types of information through 
channels. SIGN evolved into Project GRUDGE in December, 1948. 
The operation is currently being conducted under the code name 
BLUE BOOK, with liason maintained through the Air Force officer 
who 18 head of the project. 


Оп 06 December, 1950, а second object, probably of similar 
oririn, impacted the earth at high speed in the Fl Тпа1о - 
Guerrero area of the Texas - Mexican boder after following 

a long trajectory through the atmosphere, By the time а 

вевгсһ team arrived, what remained of the object had been almost 
totally incinerated. Such material as could be recovered was 
bar یا‎ to the A.E.C. facility at Sandia, New Mexico, for 
study. 


Implications for the National Security are of continuing im- 
portance in that the motives and ultimate intentions of these 
visitors remain completely unknown. In addition, а significant 
upsurge in the surveillance activity of these craft beginning 
in May and continuing through the autumn of this year has caused 
considerable concern that new developments.may be imminent. 

It is for these reasons, us well ав the obvious international 
and technolorical considerations and the ultimate need to 

avoid а public panic at а11 costs, that the Majestic-1?2 Group 
remains of the unanimous opinion that imposition of the 
Strictest security precautions should continue without inter- 
ruption into the new administration. At the same time, con- 
tinvency plan MJ-1949-04P/78 (Top Secret - Eyes Only) should 

he held in continued readiness should the need to make a 

public announcement present itself. (See Attachment "С". ) 


Joe eee eee 2 es 


TOP Sie MAJIC 
EYES ON! Y T52-EXEMPT (E) 


م - 


EYES ONLY 


12/340 


9 


20 /570 


PB 
TOP SECRET / MAJIC 006 
EYES ONLY 
> ТҮ ТТ ЛЫСЫ 


* TOP SECRET * 


нат-енккоа ааа а 


COPY ONE OF ONE. 


EYES ONIY 
ENUMERATION OF ATTACHMENTS: 
"ATTACHMENT "А"........ Special Classified Executive 


Order #092447. (TS/EO) 


*ATTACHMENT "В",...... «Орега% lon Ма jestic-12 Status 
Report #1, Part A. 30" НОУ "47. 
(TS-MAJIC/EO) ши 

*ATTACHMENT "сн" CE E E оо 5 -Operation Ma jeati с-12 Status 
Report #1, Part B. 30 NOV "47. 
(TS-MAJIC/EO) 


"ATTACHMENT "D",.......O0perntion Majestic-12 Preliminary 


Ф ҒА. Analytical Report. 19 SEP |47, 
| (TS-MAJIC/EO) 
*ATTACHMENT "Е"........Орегабіоп Majestic-12 Blue Team 
Report #5. 30 JUN '52. 
(TS-MAJIC/EO) 


*ATTACHMENT "P",,...,,,0peration Majestic-l2 Status 
Report 42. 31 JAN '48. 


(TS-MAJIC/EO) 


"ATTACHMENT "G"........Operation Majestic-12 Contingency 
Plan MJ-1949-04P/78: 21 JAN '49, 
(TS-MAJIC/EO) 


"ATTACHMENT "Н",.......Орегабіоп Majestíc-12, Maps and 
Photographs Polio (Extractions). 
(TS-MAJIC/EO) 


HAASEZILIINENET! 


EYES ONLY YES ONLY 752-ЕХЕМРТ (E). 
20 / 569 21/570 


E) 
4; 
ди 


217569 


TOP SECRET 
EYES ONLY 


THE WHITE HOUSE 
WASHINGTON 


September 24, 1947. 


MEMORANDUM FOR THE SECRETARY OF DEFENSE 


Dear Secretary Forrestal: 


Ав per our recent conversation on this matter, 
you are hereby authorized to proceed with all due 
Speed and caution upon your undertaking. Hereafter 
this matter shall be referred to only as Operation 
Majestic Twelve. 


It continues to be my feeling that any future 
considerations relative to the ultimate disposition 
of this matter should rest solely with the Office 
of the President following appropriate discussions 
with yourself, Dr. Bush and the Director of Central 
Intelligence, 


TOP SECRET 
EVES UNLY 


14 / 340 


10% 


„ч 
--- 


ем 
`... 


-^ 
P 


22/570 


Өз 


/ 569 


Roscoe H. Hillenkoetter 


Roscoe Henry Hillenkoetter was the third 
director of the post-World War II United 
States Central Intelligence Group, the 
third Director of Central Intelligence, and 
the first director of the Central 
Intelligence Agency created by the 
National Security Act of 1947. He served 
as DCI and director of the CIG and the CIA from May 1, 1947, to 
October 7, 1950, and, after his retirement from the United States 
Navy, was a member of the board of governors of National 
Investigations Committee On Aerial Phenomena from 1957 to 
1962. Wikipedia 


Born: Roscoe Henry Hillenkoetter, May 8, 1897, St. Louis, 
Missouri, U.S. 


Died- June 18, 1982, New York City, New York, U.S. 
Spouse(s): Jane Clark 

Education: United States Naval Academy 
President: Harry Truman 

Deputy: Edwin К. Wright 

Preceded by: Hoyt Vandenberg 


Succeeded by: Walter B. Smith 


15 / 340 


James Forrestal 


James Vincent Forrestal was the last 
Cabinet-level United States Secretary of 
the Navy and the first United States 
Secretary of Defense. Forrestal came 


from a very strict middle-class Irish 
Catholic family. He was a successful 
financier on Wall Street before becoming 
Undersecretary of the Navy in 1940, shortly before the United 
States entered the Second World War. He became Secretary of 
the Navy in May 1944 upon the death of his superior, Frank 
Knox. President Franklin D. Roosevelt requested that Forrestal 
take the lead in building up the Navy. In 1947, after the end of 
the war, President Harry S. Truman appointed him the first 
secretary of the newly created Department of Defense. 
Forrestal was intensely hostile to the Soviet Union, fearing 
Communist expansion in Europe and the Middle 

East. Wikipedia 


Born: James Vincent Forrestal, February 15, 1892, Matteawan, 
New York, U.S. (now Beacon) 


Died: May 22, 1949, Bethesda, Maryland, U.S. 
Political party: none 

Children: 2, including Michael 

Education: Dartmouth College, Princeton University 
President: Harry S. Truman 


Preceded by: Position established 


Succeeded Бу: Louis A. Johnson 


Dr. Vannevar Bush. 


24/5 


Dwight D. Eisenhower 


Dwight David "Ike* Eisenhower was an American 

military officer and statesman who served as the 

34th president of the United States from 1953 to 

1961. During World War Il, he served as Supreme 

Commander of the Allied Expeditionary Force in 

Europe and achieved the five-star rank of General of 

the Army. He planned and supervised the invasion of 

North Africa in Operation Torch in 1942—1943 as well 

as the invasion of Normandy from the Western Front in 
1944—1945. Eisenhower was born into a large family of mostly 
Pennsylvania Dutch ancestry in Denison, Texas, and raised in 
Abilene, Kansas. His family had a strong religious background, 
and his mother became a Jehovah's Witness. Eisenhower, 
however, belonged to no organized church until 1952. He 
graduated from West Point in 1915 and later married Mamie 
Doud, with whom he had two sons. During World War |, he was 
denied a request to serve in Europe and instead commanded а 
unit that trained tank crews. Wikipedia 


Born: David Dwight Eisenhower, October 14, 1890, Denison, 
Texas, U.S. 


Died: March 28, 1969, Washington, D.C, U.S. 


Resting place: Dwight D. Eisenhower Presidential Library, 
Museum and Boyhood Home 


Political party: Republican (1952-1969) 
Children: Doud, John 

Parents: David Jacob Eisenhower, Ida Stover 
Relatives: Family of Dwight D. Eisenhower 
Education: United States Military Academy (BS) 


Occupation: Military officer, politician 


569 


E Y k — 
Harry S Truman 


Harry S. Truman was the 33rd president of the United States 
from 1945 to 1953, succeeding upon the death of Franklin D. 
Roosevelt after serving as vice president. He implemented the 
Marshall Plan to rebuild the economy of Western Europe, and 
established the Truman Doctrine and NATO. Truman grew up in 
Independence, Missouri, and during World War | was sent to 
France as a captain in the Field Artillery. Returning home, he 
opened a haberdashery in Kansas City, Missouri and was later 
elected as a Jackson County official in 1922. Truman was 
elected to the United States Senate from Missouri in 1934 and 
gained national prominence as chairman of the Truman 
Committee aimed at reducing waste and inefficiency in wartime 
contracts. Soon after succeeding to the presidency he 
authorized the first and only use of nuclear weapons in war. 
Truman's administration engaged in an internationalist foreign 
policy and renounced isolationism. Wikipedia 


16 / 340 


93 / 569 


82 / 340 94 / 570 


Cy ^ - í 


ә. 


y 
— С = 
ЛА 
0 
| 
“4. 
ip 
ut 
RUE > 
аа 


THE MJ-12 MANUAL 


20 / 340 


61 / 569 


Dess 


Intact, Operation: iinic 
л, OPerational, or Scmi- intact айста[| of Exiraieriesi; al d 


| Алу Mechanical or electronic dey ке or Machine whi 
functional. 
| 


| Апу Mechanical or electronic dey ісе or machine wh; 
| mostlv Complete 


I 


| Devices 


| 


Of non-electronic 
Personal belongings, Organic ingestibles, ete. 


Ch appears i be un 


ch appears to 


Living non-human Organisms in apparent 800d or reasonable health. 


Deceased non-human organisms OF Portions of organisms. organic 


Other suspect organic matier, 


UNE and тапи ture, 


damaged ang 


l 102-4 Mea $1 $$ 


ID. 301 Í Arca 515; 


251 $4 
| 


| PD-40-8G | Area 51 «4 
| 


4 ІҒ.|01-қ | Arca 51 $4 


remains and 


Printed matter, electronic recordings, maps, chars, Photographs and film 
portion of a device thought to be offensive ог defensive weaponry, 


. š ; ; 1 à ; wal of OPNA 
VY CYCY ette iil iion pe arim 9f OPNA pr, 


51 / 340 


| 
| 


| UF-10.M | Arca 51 5.4 

| 

| 52-331 | Ве Lab WP.61 
Ei] 

| EBE.010 | OPNAC BBS.51 


ЕВЕ-ХО | Вос Lab WP.61 
| MM-54A | Building 21 КВН 
| WW-010 | Ака $1 S4 


| 
| 


Cpersonnel | 


— nem. 


< 
= 
7 


o 
РА 
t 
ж 


62 / 570 


AREA 51 IN NEVADA | | noc d 


South Pabiro 
Range. 
Wilderness 


I^ 
Badger 
Mountain 
w. 


Area 20 Areo 19 ie 
Area 15 -N и, 
Area © 


| Grapevine Area 17 
Mountains 
Wilderness 
Study Area : Area 18 
Electronic 
Combat 
Systems 


(ECS) 


Area 16 
Nevada : 
National Desért— — 
| -— — Lake. — 


Security в —— 


Grapevine š 
Mountains Area 29 Site — 


LOAD LOCATION SELECTED LOCATION (7) MAP COORDINATES (7) CURSOR COORDINATES?) 


AREA 51IN NEVADA LATITUDE: 37° 15' 47.0016" LATITUDE: N 37° 14 24.6069" 
LNG: LONGITUDE: -115° 47 34.872" LONGITUDE W 115° 48' 22.3295" 
LATITUDE: М 377157834 LATITUDE: М 37° 14.410116 
LATITUDE: 37.263056 LONGITUDE: W 115° 47.5812 LONGITUDE W 115° 048.372158' 
LONGITUDE: -115.79302 LATITUDE: ; LATITUDE: 
LONGITUDE: - LONGITUDE: 


eee? m 


— AC ІС ағат г 

А | 2] qi | P^ уу! | 
= | = = У. L | VINU Vi A... ...- .- | 
>( \ NN ТЕ 
E 30V ER 1А. М =) 


2/569 3/570 


So what are Extraterrestrials doing here? 

—Here you get a short text summary: 

They fill the tanks with compressed liquid air and fresh water, dump 
the contents of the sewage tank into our waterways and lakes, they 
telepathically influence decisions made within Authorities and 
Governments. They steal containers that contain everything from 
girls' make-up to video game consoles. They conduct biological 
experiments, and they have actively supported the idea of war in 
Ukraine. 


Now is the time to shoot them down. We dont have to put up with the 
above no more. 


г тт — - v 


. k 


ще и - 
—— " = - 


(4 CHINESE SPY BALLOON 


D > 


` 


— 
4“ Е 


- 


gc: 
>£ 
y ICBM SILO FIELD aai 


— 


U.S. OFFICIA Ls МАЗ BALLOON SOUGHT COMMUNICATIONS. 


m. 


32 / 570 


32 / 569 


The Soviet Union: 4 October 1957 - The first rocket-launched satellite 
was placed into an elliptical low Earth orbit from Baikonur 
Cosmodrome. Sputnik 1 circled the Earth every 96 minutes, and its 


simple radio signal was heard by scientists and radio operators 
across the world. 


= 


22 / 340 


33 / 570 


Critics say the following MJ12 manual is not real because, in it, they tell about satellites, already in 1954, (or actually in 1957, when the last note or 
change was made in this M]12 manual). 

— Well, they had balloon satellites. 

--Апа they were fully aware that even the moon above аге a satellite. 

--Тһеу write a field manual about UFO's, so of course they know what a satellite is. 

—If one can fly to here from another Solar System, that one can also have satellites, above us. 

—THE MANUAL IS LEGIT. IT'S REAL U.S. GOVERNMENT PROPERTY. 

—They don't nail all of their alien descriptions 100% correct in this 1950's manual, though. 

—Some of the text are based on qualified guesses and they had a really hard time to put this manual together at all. The Aliens didn't want it to exist. 


E 


30 / 569 21 / 340 317570 


300190] 


| TO 1201—3—11—1 
MAJESTIC—12 GROUP SPECIAL OPERATIONS MANUAL 


—  '———————Ó—— 


EXTRATERRESTRIAL 
ENTITIES AND TECHNOLOGY., 
RECOVERY AND DISPOSAL 


TOP SECRET /MAJIC 
EVES ONLY 


WARNING! This is a ТОР SECRET--MAJIC EYES 
ONLY document containing compartmentalized 
information essential to the national seeurity of 
the United States. EYES ONLY ACCESS to the 
material herein is strictly limited to personnel 
possessing МАЛС--12 CLEARANCE LEVEL. 
Examination or use by unauthorized personnel is 
strictly forbidden and is punishable by federal 
ам 


MAJESTIC—12 GROUP ' APRIL 1954 


ма) з 4а” ^4 


33 / 569 23 / 340 34 / 570 


34 / 569 


TOP SECEET / MAJIC 


КА BRNO | CIR MEPLRODMIENT OF в 
SLD жаз PELE ниша WATT Sh 


EPS PEL CFVIUESA дай) WILL BE PELLG 
MECUFAUS, ET FIR EI МОТ АРУГА. 


Бо С 1 U И с ТЫЙ 
г. г--<--+-<«<+ч4--4- 


29, PON s: x 
<< Z f1 OBI л xo _ 


A 0: Gag IIR 62 а РА Tedd Ee SS ut Яв 

š š 29% 

А EO? лунур арти чисман е cd 
1 


j 
i те. — луды» “е сетри 


IONE. OAL 
Т ¿E EOE 


% 
RISO CER — з ED EL AASARIN PIE 


P SECRET / MAJIC 
реклстноя IN Азу FORM 18 PORSEL 


24 / 340 


35 / 570 


КРАТКО ғә» + 
НДИ TEX ЗЕЕ бк Ma e 


EENI TEJ 20903720 
“er i : a » . еге 
т AM +” ^ к f ntm va 


i 


35 / 569 25 / 340 36 / 570 


36 / 569 


TOP SECRET / MAJIC EYES ONLY 
SOM 1— 01 


pecial Operations Manual MAJESTIC — 12 GROUP 
1-01 Washington 25, D. C., 7 April 1954 


EXTRATERRESTRIAL ENTITIES AND TECHNOLOGY, 
RECOVERY AND DISPOSAL 


„№ Guarneri. OPERATION MAJESTIC- —12 Paragraphe Page 
| | C section 1. Project purpose and воав. 1. PE 2 
E C uariga 2 INTRODUCTION 
Е Section Г. General... nsu I 6,7 4 
у Il. Definition and даба. а тес EP 8-11 4 
Ë Civan. RECOVERY OPERATIONS 
EE Section lL Security. 7:55: ЕУ 12,13 8 
Š П. Technology гесоуегу. LL. 14-19 9 
БҮ Снликк 4. RECEIVING AND HANDLING 
„я Section 1. Handling upon receipt of material ............. 20 15 
| Па CHAPIER 5. EXTRATERRESTRIAL BIOLOGICAL 
14% ENTITIES 
Lo th Section I. Living organisms............. cse eere cssc 21-24 17 
E Il. Non-living organisms a 25,26 18 
ОП Cirer 6 GUIDE TO СЕО IDENTIFIC ATION 
VE Section Г. ОРОВ guide. РА y US и I Ton 21-29 21 
nel у 11. Identification бена. ИСА С ДАЛ 30-35 22 
: HI. Possible origins nuu. 36.37 26 
! W.W Appendix I., REFERENCES дусы о а ық 28 
ppendix [a. FORMS... BOUE HEUS Dee t 29 
Appendix H. MAJIC- 196 ROU p PERSONNEL. EET REN Em ivt 30 


PHOTOGRAPHS ДАВАЩА ЕО Се Пе 0 NEE ‚== 31 


ppendix ITI 


SECRET MAJIC EYES ONLY 


26 / 340 


37 / 570 


SECRET 


ГОР MAJIC EYES ONLY 


CHAPTER 1 
OPERATION MAJESTIC—12 


— —ÀÓ— t — HÀ 


Section |І. PROJECT PURPOSE AND GOALS 


dc Ue o Қа i ine и 


Scope 


Fhis manual has been prepared especially for Majestic—12 units. Its pur 
jose is 10 present all aspects of Majestic—12 во authorized personnel will 
ı better understanding of the goals of the Group, be able to more 


/ рана Пу deal with Unidentified Flying Objects, Extraterrestrial Technology 
| L Y nd Entities, and increase the efficiency of future operations 


General 


725 


I mm 


SES 


4 MJ--12 takes the subject of UFOBs, Extraterrestrial Technology, and 
RET -MAJIC Е) Dxtraterresteial Biological Entities very seriously and considers the entire 
отраг т еп а] сс to be a matter of the very highest national security. For that reason 
. | securi "o tina relating to the subject has been assigned the very highest secu- 
ational `' си rity ity classification. Three main points will be covered in this section. 
LY ACCESS to i ‚ The general aspects of MJ—19 to clear up any misconceptions that. 
а ед то person nyone may de ў қ 
pepe ww © Ihe importance of the operations, 
ARANCE 1, E VE c The need for absolute secrecy in all phases of operation 
rized per son nej 
e by federal law. Security Classification 
\ll information relating to MJ—12 has been classified MAJIC EYES 
this documenf ONLY and carries a security level 2 points above that of Top Secret. The 
Eeen lor this has to do with the consequences that may arise not only from 
he impact upon the publie should the existence of such matters become gen- 
е MJ— 12 С®В@ га! knowledge, but also the danger of having such advanced technology as 
ny б Bas been recovered by the Air Force fall into the hands of unfriendly foreign 
` Powers. No information is released to the public press and the official gov- 
anscribed r otes тотеп: position is that no special group such as MJ-—12 exists 


— 20085 


` + | 
persons requg 


duction 1n 


В History of the Group 


peration Majestic--12 was established by special elassified presidential 
rder оп 24 September 1947 at the recommendation of Secretary of Defense 
imes V. Forrestal and Ог. Vannevar Bush, Chairman of the Joint 
Research and Development Board Operations are carried out under а Top 
pecret Research and Development . Intelligence Group directly responsible 
ply to the President of the United States. The goals of the MJ-—12 Group 


(1-12 аники 2 
TOP SECRET / MAJIC EYES ONLY 


[ION IN ANY FORM IS FORBIDDEN HY FEDERAL LAW 


37 / 569 27 / 340 


38 / 570 


TOP SECRET / MAJIC EYES ONLY 


are as follows 


Ihe recovery for scientific study of all materials and devices of a for- 
eign or extraterrestrial manufacture that may become available. Such 


maternal and devices will be recovered by any and all means deemed neces- 
sary Бе the Group. 


^. The recovery for scientific study of all entities and remains of entities 
not of terrestrial origin which may become available through independent 
SE action by those entities or by misfortune or military action. 


lhe establishment and administration of Special Teams to accomplish 
іле above operations 


| 
A J | e d. The establishment and administration of special secure facilities 
E located at secret locations within the continental borders of the United 
B crues for the receiving, processing, analysis, and scientific study of any and 
all material and entities classified as being of extraterrestrial origin by the 
Group or the Special Teams. 
Establishment and administration of covert operations to be carried out 
B® concert with Central Intelligence to effect the recovery for the United 
JIC EYE States of extraterrestrial technology and entities which may come down 
: inside the territory of or fall into the possession of foreign powers. 
ental 1288 г ‘The establishment and maintenance of absolute top secrecy concerning 
беп гу ай the above operations. 
за [o t ы 


n 5. Current Situation 
) 1 


LEVE It ıs considered as far аз the current situation is concerned, that there are 
Hew indications that these objects and their builders pose a direct threat to 

ипе не security of the United States, despite the uncertainty as to their ulti- 
w. nate motives in coming here. Certainly the technology possessed by these 
beings far surpasses anything known to modern science, yet their presence 

Bere seems to be benign, and they seem to be avoiding contact with our 

peces, at least for the present. Several dead entities have been recovered 

ішіг ріопу with а substantial amount of wreckage and devices from downed craft, 
v m of which are now under study at various locations, No attempt has been 
мы made by extraterrestrial entities either to contact authorities or to recover 
heir dead counterparts or the downed craft, even though one of the crashes 
Moon result of direct military action. The greatest threat at this time 


irises тип the acquisition and study of such advanced technology by foreign 


powers untnendly to the United States It is for this reason that the recov. 
ery and study of this type of material by the United States has been given 


h a high priority 
Кп } 


` 4 4АЗАН 3 
ГОР SECRET / MAJIC EYES ONLY 


(UN IN ANY FORM IS FVORBIDONRN НУ FEDERAL LAW 


( 


39 / 570 
28 / 340 
38 / 569 


TOP SECRET / MAJIC EYES ONLY 
CHAPTER 2 


Ў INTRODUCTION и 
Ld 2 
38 УА 
Т Section 1. GENERAL Е 
3 
E. Scope 
s operations manual is published for the information and guidance 
"ned information on determination, documentation um 
nd 4 of debris devices, craft, and occupants of such — 5: 


s defined as Extraterrestrial Technology or Extraterrestrial Biological 
ERE: in Section П of this chapter. 
cond: Та contain z list of current references, including technical 
: and other available publications аррісаМе to these operations. 
peor И contains а list of personnel who comprise the Majestie-12 


Section в. DEFINITION AND DATA 


POR, . Suh — appear as one of several shapes and 
n» aod а Кв extraordinary биім characterisation, 
Меса жай decom of ankapaq era or быти, 
enone or of materials at соблазна with oreet technology 
won 
ж; А әлде of кеу «атай theught һө af тайганы 
мега Sah wap marie r = 
Маже» that едва. conned wr «мет, d - 


2 o lor sect дачадан ін demanstrably different frum dian 
2.23 oor deerved оз bomo вре, : 


EN 2 ORME 


ТОР SECRET / MAJIC EYES ONLY я 


£4 PWeoes тыға 2% „фый ай 


39 / 569 29 / 340 40 / 570 


TOP SECRET / MAJIC EYES ONLY 
9. Description of Craft 


Documented extraterrestrial craft ( UFOBs ) are classified in one of four 
categories based on general shape, as follows: 

a. Elliptical, or disc shape. This type of craft is of a metallic construction 
and dull aluminum in color. They have the appearance of two pie-pans or 
ishallow dishes pressed together and may have a raised dome on the top or 
bottom. No seams or joints are visible on the surface, giving the impression 
bf one-piece construction. Discs are estimated from 50-300 feet in diameter 
and the thickness is approximately 15 per cent of the diameter, not includ- 
ng the dome, which is 30 per cent of the disc diameter and extends another 
1-6 feet above the main body of the dise. The dome may or may not include 
windows or ports, and ports are present around the lower rim of the disc in 
bome instances. Most disc-shaped craft are equipped with lights on the top 
hnd bottom, and also around the rim. These lights are not visible when the 
raft is at rest or not functioning. There are generally no visible antenna or 
projections. Landing gear consists of three extendible legs ending in circular 

nding pads. When fully extended this landing gear supports the main 
body 2-3 feet above the surface at the lowest point, А rectangular hatch is 
ocated along the equator or on the lower surface of the disc. 

b. Fuselage or cigar shape. Documented reports of this type of craft are 
xtremely rare. Air Force radar reports indicate they are approximately 2 
housand feet long and 95 feet thick, and apparently they do not operate in 
he lower atmosphere. Very little information is available on the perfor- 
ance of these craft, but radar reports have indicated speeds in excess of 
,000 miles per hour. They do not appear to engage in the violent and 
rratic maneuvers associated with the smaller types, 

> Quaid or circular shape. This type of craft is described as being shaped 

те an ice cream cone, being rounded at the large end and tapering to a 
ear-point at the other end. They аге approximately 30-40 feet long and the 

ick end diameter is approximately 20 per cent of the length. There is an 
ktremely bright light at the pointed end, and this craft usually travels 
iint down. They can appear to be any shape from round to cylindrical, 
lepending upon the angle of observation. Often sightings of this type of 
Годой are elliptical craft seen at an inclined angle or edge-on. 

ў 1. Airfoil or triangular shape. This craft is believed to be new technology 

e ТІЛ!” rarity and гесепсу of the observations. Radar indicates an isosce- 
* triangle profile, the longest side being nearly 300 feet in length. Little is 
nown about the performance of these craft due to the rarity of good sight- 
igs, but they are believed capable of high speeds and abrupt maneuvers 
imlar to or exceeding the performance attributed to types "a" and *e". 


ч. 


| MAJIC 


CRET-MÁJIC EY 


compartmentalig 


national security 
NLY ACCESS to 
imited to personj 
EARANCE LEVE 
Cab person n ef 


bral law. 


"PETIT 5 
TOP SECRET / MAJIC EYES ONLY 


AN нм i 


40 / 569 30 / 340 41 / 570 


TOP SECRET / MAJIC EYES ONLY 


10. Description of Extraterrestrial Biological Entities ( EBEs ) 
Examination of remains recovered from wrerkage of UFOBs indicates that 


Extraterrestrial Biological Entities may be classified into two disti E 
ories as follows nct 


а ЕВЕ Type 1 These entities are humanoid and might be mistaken for 
3 uman beings of the Oriental race if seen from a distance. They are bi- 


dal, 5-5 feet 4 inches in height and weigh 80-100 pounds. Proportionally 

hev are similar to humans, although the cranium is somewhat larger and 

ізге rounded. The skin is a pale, chalky-yellow in color, thick, and slightly 

SE -bled in appearance. The eyes are small, wide-set, almond-shaped, with 

M А J | RB rownish-black irises with very large pupils. The whites of the eyes are not 

| ite that of humans, but have а pale gray cast. The ears аге small and set 

SR on the skull. The nose is thin and long, and the mouth is wider than in 

1 umans, and nearly lipless, There is no apparent facial hair and very little 

\ LY body hair, that being very fine and confined to the underarm and the groin 
rea. The body is thin and without apparent body fat, but the muscles are 

ell-developed. The hands are small, with four long digits but по opposable 

*RET—M IC В пить. The outside digit is jointed in a manner as to be nearly opposable, 
4 ii АЩ... there is no webbing between the fingers as in humans. The legs are 


:ompartmenta li lightly but noticeably bowed, and the feet are somewhat splayed and pro- 
onal securit J Dortionally large. 


EBE Туре П. These entities are humanoid but differ from Type I in 
many respects. They are bi-pedal, 3 feet 5 inches - 4 feet 2 inches in height 
тией to регзод 1 weigh 25-50 pounds, Proportionally, the head is much larger than 
mans or Type I EBEs, the cranium being much larger and elongated. The 
yes are very large, slanted, and nearly wrap around the side of the skull. 
hev are black with no whites showing. There is no noticeable brow ridge, 
nd the skull has a slight peak that runs over the crown. The nose consists 
f two small slits which sit high above the slit-like mouth. There are по 
xternal ears The skin is a pale bluish-gray color, being somewhat darker 
bn the back of the creature, and is very smooth and fine-celled. There is no 
hair on either the face or the body, and these creatures do not appear to be 
hammalian. The arms are long in proportion to the legs, and the hands 
ге three long. tapering fingers and a thumb which is nearly as long as the 
neers. The second finger is thicker than the others, but not as long as the 
ndex finger. The feet аге small and narrow, and four toes are joined 
zether with a membrane 
it is not definitely known where either type of creature originates, but it 
sems certain that they did not evolve on earth. It is further evident, 
although not certain, that they may have originated on two different plan- 


‘ty ACCESS 104 


„12 GRAB 6 
TOP SECRET / MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM 15 FORRIDDEN RY FEDERAL LAW 


41 / 569 31/340 42 / 570 


42 / 569 32 / 340 43 / 570 


ГОР SECRET MAJIC EYES ONLY 


11 Description of Extraterrestrial Technology 
| lowing information is from preliminary analysis reports of wreck 
o collovced from. crash sites of extraterrestrial craft. 1947 1953, excerpts 
‘ which are quoted verbatim to provide guidance as to the type and char 
Sof material that might be encountered in future recovery opera 
| analysis of the debris from the crash site seems to indicate that 
the debris is that of an extraterrestrial craft which exploded from within 
4 came into contact with the ground with great force, completely destroy- 
the craft The volume of matter indicates that the craft was арргохі- 
nately the size of a medium аихтай, although the weight of the debris indi- 

os that the craft was extremely light for its size. 

Metallurgical analysis of the bulk of the debris recovered indicates that 
he samples are not composed of any materials currently known to Terres- 


rial science 


pote WS Sat et e Ob Wig ee ee 


o0 The material tested possesses great st rength and resistance to heat in 
iproportion fo its weight and size, being stronger by far than any materials 
" NET military or civilian aircraft at present. 

Much of the material, having the appearance of aluminum foil or alu- 
unumeomagnesium sheeting, displays none of the characteristics of either 
гора | resembling instead some kind of unknown plastic-like material. 

Solid structures and substantial beams having a distinct similarity in 
ppearance to very dense grain-free wood, was very light in weight and pos- 

: tensile and compression strength not obtainable by any means known 
y modern industry 

’ None of the material tested displayed measurable magnetic characteris- 
ics or residual radiation, 

go Several samples were engraved or embossed with marks and patterns. 
hese patterns were not readily identifiable and attempts to decipher their 
сапти has been largely unsuccessful, 

во Examination of several apparent mechanical devices, gears, etc. 
vealed little or nothing of their functions or methods of manufacture. 


43 / 569 33 / 340 44 / 570 


ГОР SECRET / MAJIC EYES ONLY 
CHAPTER 3 


у 


v К 
rini Una; ی‎ 


жазады 


RECOVERY OPERATIONS 
иди 
1 Section |. SECURITY 

1 2. Press Blackout 


j 


T/ МАЧ 


(5 
xt1 
га! 


reat cure must be taken to preserve the security of any location where 

raterrestrial Technology might be retrievable for scientific study. 

je measures must be taken to protect and preserve any material or 

ШЕ." from discovery, examination, or removal by civilian agencies or individ- 

SE. of the general public. It is therefore recommended that a total press 

0 М LY ЖЕР: be initiated whenever possible. If this course of action should not 

BE rove feasible, the following cover stories are suggested for release to the 
ress. The officer in charge will act quickly to select the cover story that 

“ЕСЕЕТ--МАУІС БҰШ. fits the situation. It should be remembered when selecting a cover 

SEC же в tory that official policy regarding UFOBs is that they do not exist 

ig co mpartmen > 13 " Осии Denial. "The most desirable response would be that nothing 

e nation al securit ИДрпизиа! has occurred. Dy stating that the government has no knowledge of 

ILY ACCE SS to Wahe event, further investigation by the public press may be forestalled. 

ON "i * Diseredit Witnesses. If at all possible, witnesses will he held incommu- 
limited to perso d hieado until the extent of their knowledge and involvement can be deter- 
EARANCE L ЕУ fined. Witnesses will be discouraged from talking about what they have 

horized регзоппе есп. and intimidation may be necessary to ensure their cooperation, If wit. 

‘ peces have already contacted the press, it will be necessary to discredit 
federal la ь eir stories. This can best be done by the assertion that they have either 

il icinterpreted natural events, are the victims of hysteria or hallucinations, 

br are the perpetrators of hoaxes, 

с. Deceptive Statements. И may become necessary to issue false state. 

hents to preserve the sccurity of the site. Meteors, downed satellites, 

eather balloons, and military aireraft are all acceptable alternatives, 
although in the case of the downed military aircraft statement care should 
be exercised not to suggest that the aircraft might be experimental or secret, 

s this might arouse more curiosity of both the American and the foreign 

press. Statements issued concerning contamination of the area due to toxic 

ppills from trucks or railroad tankers can also serve to keep unauthorized or 
ndesirahle personnel away from the area. 


1 


` 


ишеп Ж 


3. Secure the Area 


The area must be secured as rapidly as possible to keep unauthorized per- 
onnel from infiltrating the site. The officer in charge will set up a perime- 
and establish a command post inside the perimeter. Personnel allowed 


E MJ—12 46355 8 


TOP SECRET / MAJIC EYES ONLY 


REPRODUCTION IN ANY FORM IS FORBIDDEN ву FEDERAL LAW 


45 / 570 
44 / 569 34 / 340 / 


€ Т 


T / MAJ | 
МУ | 


СОНЕТ МАЛО 
compurtinenta 
гони! coun 
i8 d 
пей to регей 
ANCE LES 


HE 


AGG] 


uthorized pet 


able by federal Ia 


өш this docum ng: 


ed. person rej ij 
n the MJ 12 GRE 
production ІН ТТ, 


tranzeribed not 


45 / 569 


CHE / MAJIC EYES ONLY 


с will he көңі ін the ее ве нии heceenary (ә) prepare tae 
міс frr ағатын, and will тәнім of Miltary Бекатит Fore 
ties may ім pressm] uito service на {raffle and emm epa 
arumsbaness will Weal тила в or law новиот perepnel be 
Графа (he perineter and al] nécspenry preenulions ит я be taken 
ra Пай they do not interfere with the peu Al loti 
Perimeter Ht ia Дези е that onffieient military тентегі be utilized 
з perimeter nnd the site Inrye enaugh to kawg both unauthü 
ronnie) and (e perimeter personnel from seeing the site Onas the 
аі, regular patrols will he set up along the perlinelar U) anaua 
чину, und electron вирее Шале will be utilized to augment the 
Perimeter persninel will be equipped with hand communication 
Рори} working at the 
Ho илаш personnel will be allowed into Цин 


ҮТИ ЛИП 


ТЕТ петия with ye nmmutition 


Ie wil carry doarma 
ieu 

ие Post. Ideally, the enimand ме should be as close to the 
be ve is ре еи to efficiently coordinate operations. As soot ae the wan 


(pod ie operakinnal, алиа with the Маје м 17 Group Will be satah 


$ 


Г, Г, 


гі аі vis naire LAMINAR Anaha 

The site nnd the surrounding aren will he cleared of all 
минное personnel, Witnesses will be debriefed and detained far fur 
pa ernninalion by МР. Under no elreumstanees will wilnesses he 
leased fram custody until thelr stories have been evaluated hy Md 12 and 


nPyrt veu ueni 


ey have been tharoughly debriefed 

A preliminary evaluation of the situation will be 
pleted and в preliminary report prepared The М4--12 Croup will then 
Б рри е оп the situation nt the earliest роза а Opportunity Тһе М4--12 
12 RED 


do utualiun Elouluütiohn 


youp will Tied) take в deborminabion as 16 whether or not М4 
AM at ОРНАС Team will he Феран Бей Lo the area 


Section ll. TECHNOLOGY RECOVERY 


Hemoval and Transport 


Ах soon as commublealion 18 established, removal and transport of all 
botenel will commence under orders from М4-12 

а Documentation, If the situation permits, care should be taken to doeu 
ent the area with photographs before anything is moved. ‘The area will be 
ич Кей for radiation and other toxie agents И the area cannot be kept 
(ure for an extended period of time, all material must be packed and 
ansported as quickly as possible to the nearest secüre military facility. 
Пиз will he seeomplished by covered transport using litthetraveled roads 
herever possible 

b. Complete or Functional Craft, Craft are to be approached with extreme 
nution if they appear functional, as serious injury may result from exposure 


! ра AB3HH 9 


TOP SECRET / MAJIC EYES ONLY 


HEPHODUCPTIIKIN EN ANY FORM IA FORBIDDEN BY FEDERAL LAW 


35 / 340 


46 / 569 


TOP SECRET / MAJIC EYES ONLY 


поп and vieetrial discharges И the стай із functioning. bet 
" ke ri rt 


RED TEAM personnel wearing protective cthing. Any device that 
го be functioning should also be left to М2--1% RED TEAM disposal. 
(е стай and рама of crafts too large to be transported by covered 
be disassembled, if this сап be accomplished easily and 
hey must be transported whole, or on open flathed trailers, they 
be covered in such a manner as to camouflage their shape. 
Extraterrestrial Biological Entities EBEs must be removed to а top 
ç Шу 35 quickiy as possible, Great care should be taken to pre- 
ossible contamination by alien biological agents. Dead EBEs should 
кей їп ке at the earliest opportunity ta preserve tissues. Should live 
be encountered, they should he taken ints custody and removed to a 
ecurity facility by ambulance. Every effort should be taken to ensure 
ВЕ ғ survival. Personnel involvement with EBEs alive or dead must 
pt to an absolute minimum. ( See Chapter 5 for more detailed informa- 
dealing with ЕВҒа ) 


wii 


Tf +h 


ас: 


5. Cleansing the Area 


nce all material has been removed from the secured site, the immediate 

1 will be thoroughly inspected to make sure that all traces of Extrater- 
trial Technology have been removed, In the case of a crash, the sur- 
nding area will be thoroughly gone over several times to ensure that 
thing has been overlooked. The search area involved may vary according 
юса! conditions, at the discretion of the officer in charge. When the offi- 

n charge is satisfied that no further evidence of the event remains at the 
it may be evacuated. 


Special or Unusual Conditions 


held in readiness should the need to make a publie disclosure become nee- 


"n 


36 / 340 


о be abandoned, 4 may be approached only by specisily trained ` 


lan МЈ.1949.04Р / 78 ( TOP SECRET - EYES ONLY ) should | 


47 / 570 


E “2 uosid OVNdO Jo poate игри vorrmoss joy u POUIDIUDD 2q ти ето пат, 


| | 
FS IS еу |. GEAN | “Atuodeam auisuajop зо PNSUNJO 24 O! 1{йпонд аздар ғ jo 001008 0 301420 ішу sode | gy 


SPAY 12 Sumimg | YECWIN Í WIG pue sudeiSotogd ‘Sueyo «деш ‘Яир Huan эур panud “"рәрұ | DI 
1 
| | Joneu эше 0 зәј Jame "Aia | 


19-4№ qe ong | ЕРЕН PU? suigtai ше? '"SUISTUPSID Jo Suomiod jo Stusiup3;o uewny-vou Рәѕғәэҳт Зшлиниом | 6 
10-599 ONO | 010-299 | WEY 2192005221 Jo poog Tartddg ui <шешею urtung-uou 3uiar] РЕЛІ Fury | 8 
| | 
ТУАМ qe ong | пече | Furioj se Pns aneu шоддпе p JO звизеш 210123] 2-50и jo Го ецоәш-шоқ pue Saitddag | L 
! | Зо бизретецо Свормоедха 10 |ensnun Ч цэм pur &3ojoug»» "Siuou v; | 
PS 1$ tay | W-£01-40 | PUP 2909198 шә O1 имоих jou S[EU»]E 10 Sluəuuəjəa jo P»soduos 


FS I$ саду | N-E0€-dg 


| 


| | oP па чшивзизеш unurtunje гәч “&ñoJjouuaə, PUP 2512125 “SHUT ат 
FS IS ray i y. ГОГ | waun or U^OUY se рәутиЗоләу Apisto sipipun 10 из jo равофшоз $112 ще. pəunuəpi | ç 
f j г | 
ROS | Slaved put ѕәоләр |onuoə Рәјеіэоѕҳь i 
t-S Iç ғәр | Оғоғ-аа | pue әп} “уур uoimsindosd 21015500 are yiya SIUSQGP1] Jo SUNE pup АЗ | lup|d:5əwoq | r 
| | . . ! 
| Зо 5рзош | "Onop | 
[ 
| 


ing Равешер 29 С] Siradds Әлім әшцоеш JO әлләр 2140112513 Jo Рома Ану 


| 
Teuonunj | 
HM ошузеш Jo PAIP шору Jo Ка | 
ке кү v7 vn БЫНЫ иш ?UP US < S ae | Seta E ДЕ | p ix Б 
i pur uñisap ІР мәнән HO YUNE гі ішек 10 *Iponmiago nuy | | 
Е L Hiuk Опо ча | Yenny |і 


US Iç tary 1 ОР | pue РәЗешерип Жо; uesddeg U 


SW aoo, - t 
- Mmm | 


11 


© 
A 
E 
т 
29 
RI 


/ MAJIC EYES ONLY 


RET 


TOP SEC 


Hy FEDERAL? au 


ОКМ 18 VORRIDDEK N 


IN ANY p 


REPROD TION 


48 / 570 


37 / 340 


47 / 569 


ГОР SECRET MAJIC EYES ONLY 


“RET MAJTE Eyka ONLY 


Нате уты, TECHNOL беге қасы 


OT Fee А 


SECRET MAJ] i 

в сотраг! тедра 

e national Secur ; | 
INLY ACCESS M | a 
limited to persi ы 
EARANCE LE 

horized Persons i | 
т 


е by federa] lag 


this docu meni 
4; 


reque 
I-12 GER 


persons 


SECRET; MAJIC КУБУ ONLY 
— MÀ ———._... 


—=ЗЭЗ+За.. 


SOM 01.2 


Figure 2. MJ Form 1--007 


Packaging and Packing Data 


а. Domestic Shipment Individual items are 
) oisture-vaporproof harrier and heat sealed. The 
"rated fiberboard box. The voids within the 


tagged and wrapped in a 
y are then placed in a cor- 
box are packed thoroughly 


13 
SECRET / MAJIC 
| N IN AD 


EYES ONLY 


VY FORM qs FOHHIDDEN HY FEDERAI LAW 


38 / 340 
48 / 569 


49 / 570 


49 / 569 


ГОР SECRET / MAJIC 
APTE 


EYES ONLY 
CH 4 
RECEIVING AND HANDLING 


Section І. HANDLING UPON RECEIPT ОҒ MATERIAL 


| Uncrating, Unpacking, and Checking 


(Ñg. 3) 


E, 
M A [ өй, The uncrating, Unpacking, a 


12 ACCESS ONLY" will be 
/ is №. Containers marked ің this mann 


until euch time as euthorized Pereonnel are available for thero Procedures, 


К M and Unpacking the material. Avoid 
MAJ 3 isting tools into the interior of the shipping container, 
packaging materiala any more than ің ab 


interior packaging materials within the shipping container. When 
ESS: erating and unpacking the specimens, follow the procedure given in (1) 
“+ uh (11) below: 


(1) Unpack the specimens іп а top Security area to prevent ассояа 


Е of unauthorized personnel, 

| (H) Cut the metal wires with а suitable cutting tool, or twiat them 
Crsg г with pliers until the Straps eryatallize and break. 
ral (J) Remove serews from the top of the shipping container with д 


serew driver, 
a (4) Cut the tape and воан of the ease liner во that the waterproof 
umg paper will be damaged aa little as posuibl ^ 
2 (5) Lift out tho packaged apecimens from the Wooden case, 
(6) Cut the tape which seals the top flaps of the outer cartons; be 
careful not to damage the cartons. 


(0 Cut the barrier along the top heat sealed seam and carefully 
remove the inner carton, 


(8) Remove the sealed manila envelope from tho top of the inner 
carton, 


(9) Open the inner carton and remove the fiberboard inserta, dossi» 
cant, and humidity indicator. 
(10) Lift out the heat sealed packaging containing the specimens; 
arrange them in an orderly manner for inspection. 
(11) Place all packaging material in the shipping container for use in 
4 future repacking, 


b. Thoroughly check all itema against the shipping documents, Carefully 


12 4835 15 
3 TOP SECRET / MAJIC EYES ONLY 
5.1 НЕРВ ИН TION IN ANY PONV tS esee 
39 / 340 


50 / 569 


d~ ХАТА 


ak 4 
"IPPihg or ka 
P'vparat хм: 


in 


t for tra 208 the 


++ ` N 
SSEDOF toc. transfer to the 


ОГ danan 
o the deci “рат "nent no. 
óc SIS Tate] areas n pt Tsanaej 

{ из will i 
E 


Cartei hy secu 


ered 


transport 


40 / 340 


51/570 


h Xtraterrestria] Biologi- 
encounters fail und 


er the Jurisdiction of MJ Jo 
alt with by this Specíal unit only i 
оп details the responsibilities of ersons or units making the initial соп. 
ct 


<. General 


Any encounter with entities known to be of ехігагеттезігізі origin is to be 
nsidered to bean ; : 


“СКЕТ Under no circumstane і 


als or their artifacts, Any 
icy is absolutely forbidden. 


n B. Encounters 


Encounters with ЕВЕ may 
tegories: 


а. Encounters initiated by ERR: O8Sible contact may take place аз a 
sult 0f Overturns by the entitie ез. [n these instances It is antici. 
ure locations selected by Mutu 


ау from public Scrutiny Althou 


AU Team will formulate cover stories for 
е press and Prepare briefings for the President and the Chiefs of Staff. 
| downed craft Contact With Survivorg of 


»onnel to preserve security. Civilian wi 
the area Will be detained and debriefed by MJ 


/—12. Contact with ЕВЕ, 

Military Personne] hot having MJ-. 19 or OPNAC clearance вю» 

ictly limited to ac °в8агу to ensure the availability of the EBE; for 
Rudy by the OPNAC Team 


FET i^n 


17 
герр SFC Fo f, 


41/340 
51 / 569 


52/570 


TOP SECRE 
Isolation and Custody 


п. EBEs will bo detained by Whatever me 
secure location as 


soon as possible. 
Coming i 


. If the entities are 
в or breathing üpparatus of some ki 


ind 
# damage to these devices. While all efforts 
well-being of the EBEs, th i 


RET / МА, 
SONLY ` 


Er 
3 


Injured or woun les will be treated 
ened to the OPNAC Т. . 


tely available, F 


, 
р ер M A J E: be confined to the stoppin bandaging of wounds and splint. 
0) MA, 10 of broken limbs. No Medications of any kind are to be administered аз 
Е 5 EJ effects of terrestria] medicationg оп 

see " ро: sible to prediet. аз 
ES ONL) { Ез 

per In dealing with any living Ex 


iological Entity, Security is 
paramount importance All other Consideration 
в preferable ] 


5 аге secondary. Although 

lo maintain the Physica] Well-being of any entity, the lose of 

"50m Е life із cousidered acceptable if conditions or delays to Preserve that life 
ral $ ny way compromises the security of the | 


Once the OPNAC Tea 
романс ] 


m has taken custody of the EBEs, their care and 
ated facilities becomes th 


е responsibility of OPNAC 
ation will be extended t 


9 the team іп carrying out 
гей Team Personne] wil] ba given ТОР PRIORITY at all 
| regardless of their apparent rank ог status, No Persón has the 
% ^ M3 lority to interfere with the OPNAC Team in the performance of its 
any by special direetion of the President 0f the United States, 
net 
E Section ||. NON-LIVING ORGANISMS 
Scope. 
deally. retrieval fo 


г Selentifie study of с 
Ваше will be с; 


adavers 
Dcedure Because 


and other biological 
liar with thia type of 
'ollection тау need to 


provide guidance for 
“vers and remaina in the field 


18 


53 / 570 
42 / 340 
52 / 569 


Lm M 
etrieval ang Preservation 
The degree 


ге 


А Photograph} good 
Verl fw } ag rec 1 
Әуес from the site ord will be made of al] aa l x 


э 


gical ? Physica! 
41. 4 EICA gloves с e , 
eather gloves may be * should be worn or. ; cadavers or remains being 


ved с 
v 


! in war с 
thi өңі. coverin 
. 7 Purpose if ner 
фе я : ather 
ашаМа All rema; et temains will he refriz sear may be 
ы ta; eirigerated or packed 
Ts f Hains wj чес and 
ФОТ m қ М 
» Сы Immediate. remoya] ll be Placed 00 Stretch He time and 
Ш detached noval to а secure р chers or in sealed 
"d Pieces е facility. 
“Taped from sal: 
Solid 


p- г 
. ауаЦаЬ! 
ntents e ( 
№ re : and t 

efrigerated оғ packed he ume and dat 
зесите facility with 


, Surfaces will be 
ontamers wil] be 
© recorded. Con. 


wi 


` K 


Gg ton 


ке аз 


q gà soon аз possible and 
‚ Н ы 

ка 
ta 


53 / 569 43 / 340 i 54 / 570 


CCHET / МАЛО қүра ONLY 
/ >... теа. ее “m зе, 
УМ жу» лы Lore Ct 
ó Š PNG 
е“... anao w haa Aa. BAS CA д | | 916 


Figure 4. Extroterrestrial craft. 


P SECRET / MAJIC EYES ONLY 


DDUCTION IN ANY FORM 18 FORBIDDEN BY FEDERAL LAW. 


55 / 570 
54 / 569 


"€ аб, 


E à UP are thos 
"a. ПРИМ же aparato; 


ated LIT. 


tings of 


“жата whid 
: i 4 ose грама it volving 
МА ACCESS 


qha a; 


а Holes of Thumb 
АКАЛСИ LE 


y { } 0H сазе Should be ішіне! ца but thors ге a Humber ar 

orized perso т. И thumb. Under sach of the follow ino headings. Which should Mie 
А “piui in determinin be £ 
о by federal] Р | E the necessity fire f 


w up ша iy а! ra 


ighting ta [esa than 15 
169 аге great Qha; owun Aaa 
of caution, Һор, Should а large number of individua] Ç bservess con 
' unusual fighting of a few seve 

і 


Mda duration. И до 
^ Number of Persons 


: 
his docu ma 


Persons 


'MJ- 12 @ 


uid по he dia 


Short duration Sightings by 
worthy of fol ow üp Two ос three competent 
pendent Observations Carry the Weight of 10 OF More MUTANS indi 
scribed no dual observations 


9 people at one 
is, however, 


1 мин may observe a 
range light in the thy, T Нав lesa weight than two reliable 
wple observing the same light from different locations In the latter case a 
“поп Вх m indicated 


Location of Sightings to 
hich meet the preliminary Criterion stated al 


' Ís in the immediate 

For reports involving g 
dged as being inversely 
ances concerned For example, 


Nearest Field Ung Reports 
Ve should all be inyestigatod 
Operating vicinity of the squadron 
Teater distances, follow up necessity 
Proportional to the "quare of the dis. 
an occurrence 150 miles away might he con 


21 


MAJIC EYES ON LY 


V ANY FORM } 


S FORBIDDEN HY P FEDERAL LAW 


56 / 570 


The MJ12 spy-photographed manual batch, only has the first 21 pages, from UNIT-KB-88. 
On second manual page there are also stamped KB-88 21. The 21 may mean it's only 21 Pages. 


--Ви in the late 1950's, a person asked the closest Air Force Base, of how to identify UFO's? 
And the Air Force Base sent him the whole section of the MJ12 MANUAL, 
dealing with identifying UFO's. 
That's why the next 4 additional MJ12 MANUAL PAGES look different. 
A few pages overlapped each other, but | only used the 4 additional pages, | missed from the first batch. 


56 / 569 57 / 570 


This unclassified сору is for research purposes. Rev 10.1; 10/21/98; Helvetica headers, Times New Roman text, 10/12 pts. 
The Government has declared that sich а classification does not exist. 


TOP SECRET / MAJIC EYES ONLY 


sidered to have four times the importance ( other things being equal ) than 
one that is 300 miles away. 

d. Reliability of Person or Persons Reporting. In establishing the necessity 
of follow-up investigation only “short term" reliability of individuals can be 
employed. Short term reliability is judged from the logic and coherency of 
the original report and by the age and occupation of the person. Particular 
attention should be given to whether the occupation involves observation 
reporting or technical knowledge. 

e. Number of Individual Sightings Reported. Two completely individual 
sightings, especially when separated by а mile or more constitutes sufficient 
cause for follow-up, assuming previous criterion have hot been violated. 

А The Value of Obtaining Additional Information Immediately. If the infor- 
mation cannot be obtained within seven days, the value of such information 
is greatly decreased. It 15 of great value to obtain additional information 
immediately if previously stated criteria have been met. Often, if gathered 
quickly, two or three items (weather conditions, angular speed, changes in 
trajectory, duration, etc.) are sufficient for immediate evaluation. If 
investigation is undertaken after weeks or months the original observers 
cease to be of value as far as additional new information is concerned. 
Generally, late interrogation yields only bare repetition of facts originally 
reported plus an inability on the part of the observer to be objective. 

g. Existence of Physical Evidence (Photographs Material, Hardware). In 
cases where any physical evidence exists, a follow-up should be made even if 
some of the above criteria have not been met. 


29. Conclusion — UFOB Guide. 


It is understood that all above criteria must be evaluated in terms of 
“common sense." The original report, from its working and clarity will 
almost always suggest to the reader whether there is any "paydirt" in the 
report. 


Section И. IDENTIFICATION CRITERIA 


30. General 


When a UFO report meets, in large measure, the criteria projected in 
Section I and a follow-up investigation is instituted, then the interrogator 
should ask what physical object or objects might have served as the original 
stimulus for the report. The word “object” here includes optical phenomena 
such as reflections from clouds, sundogs, etc. Frequently one or perhaps two 
solutions will be immediately suggested by the nature of the report. The word 
“solution” cannot be used here in the scientific sense. A solution in UFOB 
work means that a hypothesis has been arrived at which appears to have the 
greatest probability of having given rise to the given report. Following is a 
group of hypotheses or examples which should prove helpful in arriving at 
solutions. A check should be made to see how many of the items are satis- 


MJ—12 4838B 22 


TOP SECRET / MAJIC EYES ONL Y 


57/569 REPRODUCTION IN ANY FORM JS FORBIDDEN BY FEDERAL LAW 53 | 570 


This unclassified сору В for research purposes. Rev 10.1; 10/21/98; Нем Ка headers, Times New Roman text, 10/12 pts. 
The Government has declared that such a classification does not exist. 


TOP SECRET / MAJIC EYES ONLY 


fied by the report and how many are missing. An effort should be made to 
obtain any missing items as soon as possible. Each typical hypothesis is listed 
in a separate paragraph. 


31. Aircraft 


a. Shape. From conventional to circular or elliptical. 

b. Size. Pinpoint to actual. 

c. Color. Silver to bright yellow (night — black or color of lights). 

d. Speed. Generally only angular speeds can be observed. This depends on 
distance but small objects crossing major portion of sky in less than a minute 
can be ruled out. Aircraft will not cross major portion of sky in less than a 
minute whereas a meteor certainly will. 

e. Formation. Two to twenty. Numbers greater than 20 more likely birds 
than aircraft. 

J. Trails. May or may not have (vapor and exhaust). 

g. Sound. Zero to loud shrill or low depending on altitude. 

h. Course. Steady, straight or gently curving (not erratic — may appear 
still if approaching head-on). Right angle turns and sudden reversals, changes 
in altitude ruled out. Note: Although report may indicate erratic course, if 
other items check, follow-up should proceed on basis of aircraft because of 
psychological tendencies of excited people to exaggerate course changes. 

i. Time In Sight. More than 15 seconds, generally of the order of a minute 
or two. 

j. Lighting Conditions. Night or Day. 

k. Radar. Should show normal aircraft returns. 


32. Balloons 


a. Shape. Round to cigar or pinpoint. 

b. Size. Balloons up to a hundred feet will generally appear from pinpoint 
to size of a pea held at armlength. 

c. Color. Silver, white or many tints. It may possibly appear dark as when 
projected against the clouds. 

d. Speed. Large scale erratic speed ruled out. In general, hovering to slow 
apparent speed. 

e. Formation. Single to cluster. 

f: Trail None. 

г. Sound. None. 

h. Course. Straight with a general gradual ascent, unless falling. 

i. Time in Sight. Generally long. Note: Balloon may suddenly burst and 
disappear. 

J. Lighting conditions. Night or day but especially at sunset. 

k. Radar. No return except when carrying sonde equipment. 


M.—12 4838B 


TOP SECRET / MAJIC EYES ONLY 


b8 / 569 REPRODUCTION IN ANY FORABIS FORBIDDEN BY FEDERAL LAW 


This unclassified copy is for research purposes. Rev 10.1; 10/2198; Helvetica headers, Times New Roman text, 10/12 pts. 
The Government has declared that such a classification does not exist. 


TOP SECRET / MAJIC EYES ONLY 
33. Meteor 


a. Shape. Round to elongated. 

b. Size. Pinpoint to size of moon. 

c. Color. Flaming yellow with red, green or blue possible.. 

d. Speed. Crosses large portion of sky in few seconds except if coming 
head-on. 

e. Formation. Generally single — can break into shower at end of 
trajectory. Occasionally (but rare) small groups. 

А Trail. At night almost always a luminous train which can persist as long 
as a half hour (rarely). Daytime meteors are much less frequently observed. 
In daytime, leaves a whitish to dark smoke trail. 

8. Sound. None, although occasionally reported (believed psychological). 

h. Course. Generally streaking downward, but not necessarily sharply 
downward. Can on rare occasion give impression of slight rise. 

i. Time in Sight. Longest report about 30 seconds, generally less than 10. 

J. Lighting conditions. Day or Night. Mostly night. 

k. Radar. Return from meteor itself is highly improbably, however, the 
train left by a meteor, is a good radar reflector. 

1 Other. An exceptionally bright meteor is called a fireball. These are rare 
but extremely spectacular and on occasion have been known to light 
surroundings to the brightness of daylight. 


34. Stars or Planets 


The planets, Venus, Mars, Jupiter, and Saturn are generally brighter than 
any star, but they twinkle very much less (unless very close to horizon). Stars 
twinkle as great deal and when near the horizon can give impression of 
flashing light in many colors. 

a. Shape. Pinpoint — starlike. 

b. Size. Never appreciable. 

c. Color. Yellow with rainbow variations. 

d. Speed. Stars apparent speeds carry them from east to west in the course 
of the night but they are often reported as erratic. The effect is psychological, 
most people being unable to consider a point as being stationary. 
Occasionally turbulence in the upper atmosphere can cause a star to appear to 
jump (rare) but somehow twinkling gives the impression of movement to 
many people. 

Note: Just because the report sayes the light moves does note rule out the 
possiblity 

of it being a star unless motion is from one part of sky to another relatively short 

time. 

е. Formation. There аге no clusters of very bright stars but faint stars are 
grouped in their familiar constellations. Note: a report of 4 or 5 bright 
clustering lights would rule out stars. 

f. Trail. None. 

g. Sound. None. 


MJ—12 4838B 


TOP SECRET / MAJIC EYES ONLY 


59/569 REPRODUCTION IN ANY ЕОКЯВИ FORBIDDEN BY FEDERAL LAW 60 / 570 


This unclassified copy 15 for research purposes. Rev 10.1: 102108; Helvetica headers, Times New Катап text, 10/12 pts. 
The Government has declared that such a classification does not exist. 


TOP SECRET / MAJIC EYES ONLY 


h. Course. Always describe 24 hour circle around pole of sky from east to 
west. 

i. Time in Sight. When clear, stars are always visible. Most stars rise or set 
during the course of the night. Stars low іл western sky set within an hour or 
two. Stars in east, always go higher in sky. 

j. Lighting conditions. Night — Twilight. 

k. Radar. None. 


35. Optical phenomena 


This can cover a multitude of things. Original scanning of the report should 
be made to attempt to determine whether it more likely describes a material 
object or an optical phenomenon. Optical phenomena which have been 
reported as UFOBs run from reflections on clouds and layers of ice crystals 
(sundogs) to the many types of mirages. No one set of optical phenomena can 
be set down as representation for the whole class. There is no limit to the 
speed of optical phenomena. Reflections can travel from incredible speed, as 
in the case of a search-beacon on high clouds, to stationary. These cases if 
well reported will almost always warrant follow-up. Their variety and 
connection with upper atmospheric conditions make these observations 
especially valuable scientifically. 

a. Shape. Generally round but can be elliptical or linear. 

b. Size. Starlike to large luminous glow. 

c. Color. Generally yellow. 

d. Speed. Stationary to fantastic. 

e. Formation. Any. 

J. Trail. None. 

8. Sound. None. 

h. Course. Any. 

i. Time in Sight. Any. 

J. Lighting conditions. Day and night. 

k. Radar. No return. In special cases radar response will occasionally have 
to do with unusual clouds, and meteorological phenomena such as described 
in Minnaert's book “Light and Color in the Open Air.” 

І. Other. One of the standard types is the “sundog.” In this a large luminous 
halo is seen around the sun with one to four images of the sun placed along 
the halo circle at intervals of 90 degrees. Another report often has to do with 
a bright planet or even the moon shining through a light overcast. Mirages 
reflections are said to occur frequently when temperature inversions exists in 
the atmosphere. If an optical phenomena is suspected, routine check of the 
meteorological records should be made to establish whether such inversions 
existed. 


MJ—12 4838B 


TOP SECRET / MAJIC EYES ONLY 


Б0 / 569 REPRODUCTION IN ANY FORSI/SAQRBIDDEN BY FEDERAL LAW 61/570 


«See rs. 


62 / 569 52 / 340 63 / 570 


Jul 


ef L— 55 - 


JESSE A. MARCEL, МО. P C The following is a hand drawn picture of what the "J" beam member 
$00 NORTH MONTANA AVENUE looked like with helroglyphi i! утро] n le dev be d 
HELENA. MONTANA $9451 some value to you. Уйне Like symbols. T hope this may be of 


TELEPHONE (406) 442.2410 
P = 


1157414) 


0.5"- 0,75 l 
in X Section Ltn “-. ж-е. 


Ja 
i 


Ги: 
: Sincerelv 


—— "T P— ум 
1 2 3 4 5 6 7 8 9 10 


63 / 569 53 / 340 64 / 570 


ALIEN INSCRIPTION: 
HAVE THE ROSWELL UFO DEBRIS SYMBOLS BEEN DECIPHERED? 


May 2018 


The Folleving im a hand Oca wivigew w€ “hab che "I* Deom menter 
¿porod lam with ^eLr*olyp c 155% жушы f Insee ілін ғау іт ¿Í 
w us iO ур). 


The late Dr. Jesse Marcel Jr., MD was witness to some of the Roswell UFO crash debris as a youngster. His father, Major 
Jesse Marcel, was stationed at Roswell Army Air Field in July of 1947 when directed to investigate a large field of strange, 
strewn material, fallen from the sky to the desert floor, on a ranch north of town. It was so interesting that he absconded 


with a bit of the material and brought it home for his family to see. Skeptics often miss this simple, important detail. If the 
debris were so "mundane" (like balsa sticks and balloons) as they contend, then why would Marcel essentially steal 
material evidence that he was directed to investigate, taking some of it back to his 12 year old son Jesse Jr. and wife 
Viaud, so that they too could see how unusual it was? 


Jesse Marcel Jr. was a noted ear, nose and throat doctor, and was at 
one time a military flight surgeon. In 1989, Dr. Marcel drew the 
symbols just as he so vividly remembered them, the "hieroglyphic" 
figures found on some of the debris. The figures were embossed on an 
18 inch fragment of a metal-like "I-beam" structure. The symbols were 
of a violet-purplish metallic hue and were about % to % inch tall. When 
Marcel Jr. showed his drawing of what he remembered the debris 
symbols looked like to his mother, she concurred that they were her 
recollection as well. SEVERE SEE EU the characters on 
it, that Marcel Jr. was able to recall and recreate them decades later 


Dr. Jesse Marcel Jr. 


WHAT THE SYMBOLS SAY: 
THEY COMMUNICATE TECHNICAL INFORMATION Or origin of Spacecraft. 


One man said the symbols meaned: —No Smoking When Light Is Lit. 


64 / 569 54 / 340 65 / 570 


Here are a photo of the I-beam Marcel spoke about. 
I am truly sorry that Marcel Junior passed away, before 
65 Asepuld show him this photo of what he described. 


š 


66 / 570 


26 / 570 


26 / 569 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


293 / 569 293 / 570 


ІІІ”. 
А. | № | 


1 ` 
N 2 
\ М» / / 
% Ñ 4 w- Ë 
алға = a ik 
> ) МО Jos 2 Ж 
h „ - Ж ` 
Уч. к ~ A < 
m. 
= 


THE UNITED STATES S-4 FACILITY. 


66 / 569 56 / 340 67 / 570 


54 MOUNTAIN OPENING BAY TO THE RIGHT. 


В / 569 Entrance 


^ 
t 


x 
аже 


AS 


AREA 5-4 SUB FLOOR LAYOUT 


JRAWN BY MICHAEL SCHRATT | 
[DATE FEBRUARY 28. 2010 |) 


Exploded view of Area S-4 showings levels 1-5 as described by Drs. Dan Burisch and Marcia McDowell. 
The facility was originally designed as a biological weapons laboratory in the early 1950's. After arriving at 
Area 51, Dan would either be driven by a bus or flown by helicopter to Area S-4. 


71 / 569 60 / 340 72/570 


72 / 569 


алы 


AREA S4 f перст хтон 
(LEVEL 4-1) Ww iih, пилы 


(THE DARK SIDE OF THE MOON) £ we ee ae 


SECURITY CAMERA DOMES WERE POSITIONED EVERY 
10 FEET ALONG THE HALLWAYS 


CEILING мент MEASURED APPROX 8 ТО 12 FEET 


TRANSPORTED TO ТНЕ 
FACILITY FROM AREA 51 BY WAY OF А STANDARD. 
BLUE COLORED AIR FORCE BUS Ой HELICOPTER 


HANGAR 1 
LOCATION OF "SPORT MODEL” 
REF HANGAR GAYS 1 & POSSIBLY 2 


LOCATION OF з WANT TO BELIEVE" POSTER 2 
A omma 


PSS TO BUS OR MELICOPTER 


Level 1 housed fire control equipment, a dining facility, communications, security/surveillance, an avionics 
laboratory, and the archives or files department. Provisions for a propulsion research laboratory are also housed 
on the first floor of Area S-4. The dining area seats consisted of round tables with four attached round seats. The 
cafeteria seating arrangement was broken down specific projects which included: Project Galileo, weapons 
research, Project Looking Glass, and Project Aquarius (see level 4-1 floor layout drawing). Note: special 
members of MJ-12 had their own designated table in the cafeteria. The interior of all nine hangar bays included 
a red circle which contained the designation 4-1 in red text. 


61 / 340 


73/570 


73 / 569 


AREA S4 
MEYDOS TEMA д (LEVEL 4-2) 
PINE GAP AUSTRALIA "ALICE'S FLOOR" 


LOOKING GLASS DEVICE 
(SEE OETAIL VIEWS ON SEPARATE PAGE) 


W 115.00616 
ASSIGNMENT С 
MAJTSEO 18 


ERB PROGRAM CODES 
"FUP BOOK" WORN ON ARM 
(GALACTIC POSITIONING CODES) 


WALKWAY TO PRIMARY 
u 
(SEE DETAIL VIEW) 


TRANSPORT PADS 
(SEE DETAIL VIEW) 


ORIGIN OF P2 ORIONS 


MAN-MADE STARGATES WERE 
REVERSE ENGINEERED FROM 
ВАМ 


И POSITIONED EVERY 10 FEET 
A STUFFED "ALICE IN WONDERLAND” (VEGAS CASINO TYPE) ROLL IN THIS DIRECTION 


AUTOCAD DRAWING BY: MICHAEL SCHRATT 6/2/2010 
PER DAN BURISCH TESTIMONY AND SKETCHES: 


Level 2 or “4-2” was known as "Alice's Floor". This specific floor contained a laboratory for weapons 
research and development, three board rooms, and provisions for emergency supplies. Also located on level 4-2 
were two specific areas which contained components for project sidekick. Level 4-2 was also the location of 
Project Looking Glass. This device utilized six (composite) electromagnetic fields, and a height adjustable 
rotating cylinder which is injected with a specific type of gas. The entire assembly can be rotated 90 degrees 
from the horizontal axis. This allows scientists to warp the local fabric of space-time both forward or backwards 
by long or short distances relative to the present time. The Project Looking Glass device was used to predict the 
potential probability of future events. Once the device is tuned properly, images of probable future events are 
projected in open space within the fields, similar to a hologram. The data output of the device (images and in 
some cases sounds) were then captured via high resolution audio-video capture devices. If multiple probabilities 
of the same event were displayed, they could be de-interlaced by use of specific software platforms. Next to the 
Project Looking Glass device were two "transport pads" which could teleport physical matter or humans from 
one location to the other instantly, but not always reliably and with certain disastrous outcomes during testing 
phases. Dan had the unfortunate experience of being in the room during one of those unfortunate outcomes, and 
witnessed a death. 


62 / 340 


74/570 


74 / 569 


AREA S4 
(LEVEL 4-3) 


AUTOCAD DRAWING BY MICHAEL SCHRATT 6/2/2010 
PER DAN BURISCH TESTIMONY AND SKETCHES 


Level 3 of Area S-4 contained the residential living quarters for members of Majestic 12. Dan and I are only 
willing to say the following, and only that information may be represented as coming from us: “Тһе former 
Leader of the Consistory of the Majestic was accurately identified by Dr. Dan in an affidavit sworn under 
penalty of perjury. That former leader was a high ranking official in: 


a) The United States Navy 
b) The National Security Agency (NSA) 
с) The director of National Intelligence's Office 


That former leader is properly indentified by the name: “7. McConnell". The residential portion of this level 
consisted of 12 apartment-like rooms, complete with a sunken living area, television and rest room. Level 3 also 
contained decontamination wash stations, along with a storage facility. Additionally, level 3 contained a board 
room, and provisions for a fully equipped biological laboratory consisting of tissue and cell culture analysis 
areas, and dissection facilities. 


63 / 340 


75/570 


75 / 569 


AREA 54 
(LEVEL 4-4) 
ТОННИ E AQUARIUS LEVEL 


(NOTE. THIS FLOOR 1S DEVOID OF 
RED OR BLUE UNES ON THE FLOOR) 


ج 

Utere hr 1 
mE: | 

H! 

Шы 

Г. 1 

Г | ] 

ЕЕ 


AUTOCAD DRAWING BY: MICHAEL SCHRATT 6/2/2010 
PER DAN BURISCH TESTIMONY AND SKETCHES 


Level 4 aka the “Aquarius Level” contained five decontamination areas, along with multiple laboratories and 
equipment rooms. Level 4 also includes the only access elevator to Level 5. While working at Area $4, Dan’s 
security badge number was: H-6196MAJ. Dr. Marcia's Majestic badge number was Q-3192MAJ. According to 
Dr. Dan Burisch, his boss at Area S-4 reported to the Majestic 12, who in turn reported to a cover committee 
who reported to the Committee of the Majority. The cover committee’s job was to condense, and sometimes 
prevent reports from reaching the committee of the Majority. The Committee of the Majority was an 
internationalized version of the group called “The Majestic” which had been started in 1947 by President Harry 
S. Truman following the Roswell crash. The Majestic 12 were organized after the Roswell crash, not because of 
extraterrestrial contact; that could have been handled with the existing infrastructure of the U.S. military, while 
it was being reorganized following World War II. 


64 / 340 


76/570 


cen ornare stanon mesrangon wi AREA 54 
ШЕШ Soot OF ETHER ME WOLE SAFETY 
ou TENS 72 (LEVEL 4-4 BCL DETAIL) 
& WOULD BE ASSESSED. MF TESTED DRESSED 
чег Тона каз. a CONTROL их M— 


n ROLLED ADMISSION. 
PRESSURIZATION CHECKS ТО ECL 2 BLUE ZONE FOR EGRESS OR REENTRY 


TO BCL LAB. 
THESE LOCATIONS IN TOTO WERE REFERRED BCL 2 TO 3 BCL2 RED UNE TO 
“L. لومت‎ дена ien سملم‎ AMET 'BCL!TO2 PASSES FROM RED UNE 
WOULD RADIO "UNIT (THIEN OUR NUMBER) DRAGON ux 


вс TO UV TESTING ісі 


BCL? TO 1 X PRESENTATION AREA 
TO BCL? DECON BLUE LINE 


AUTOCAD DRAWING BY: MICHAEL SCHRATT 7/30/2010 
PER DAN BURISCH TESTIMONY AND SKETCHES 


Detail view of Level 4-4 showing Bio Containment Labs. 


76 / 569 65 / 340 77/570 


77 / 569 


AREA S4 
(LEVEL 4-5) 


CULA mame таз. 


дрян эче. à жоя коо т бав FLOOR 
Gat TE ACE GAP POR VIC PLA 
844 CLEAN ayama FLOOR 
з ORANGE STAR. 2 ~ 
AFOROG 4 SECTIONS 27 рна ест 
OF v RATES EACH nn 


памет CONQUTS 
Маст) TO 
само 
vanont MODULE 
емо TH SER VOR 
Sanon 
Tern 
Am осема, вита, FIT тапта 
r^ OSG EQUIPMENT 
p 
OVERHEAD. 


STANCANO маю. 
OFFICE атм 
PULMONARY AND 
AW EQUIPMENT 


Шз Талси GATING LAYOUT 
Nim LOCKING UP 


мана 


rv MON QUALI 
VIRA TRADI 


жолым!» мі» 
(M UPPER тн coman VIEW. 
селси ит вето A 
LOW RUMBLINGS NOSE 
DUE TO те ка 
мех IN OPERATION 


sosson urt — 
= UP CONFIGUMA TION IN PARTIAL DOWN 
CONFIGURATION. 


SOS LT DICTA. 


AUTOCAD DRAWING BY MICHAEL SCHRATT 8252010 
PER DAN BURISCH TESTIMONY AND SKETCHES 


(S4-4/5 GANTRY VEHICLE AND OVERVIEW OF CLEAN SPHERE ENTRY PROTOCOLS) 


Let FLOOR ими, Cun 


АД 
T 
В а Е 

TAMINATION AREA TO CLEAN SPHERE | 
кета тие ANTHY менси WAS STUL т DECON ABA ОЦ ОАО MENO мес-схесхео SUITED. FITTED ОЕ ANO COMPRESSED, 
Stout ПВО WOE ONCE Irt RAN SIR tic МАМЕ TOTES САМО < еее AT T VIAE T рис DAFEN DOO 
MLB NCC Mi! Өтм P A CLOSED қорта WIN ТИ UTERO CLOBURE. DOW ON ОРОМ. ORAT TO RATER 1 WOULD STEP 
ее ne Te Әлен DOON там өлер OV TME COLLATED КИМА. LORI RU те LA 1 WOULD там 
ВКС 1O Ine miu, CCH AEA NONS PORT ON тес НОВАВА BILE TOA РАМО. ANG HOSE U TO ТЕ W TERNAL ORUM ONCE 
Tee COMARCA DOR AND NP OW HAIN COM PSD | WOLD BARCO T PRON Tr EXTERNAL HOUPI ДО Rese AAD MAL Tre 
Meu МО + 22841 WOULD TIN LOOK TE EDN DER AND STU» OY t GANT РК fre ORUM WEAD OF IBN. 
Saver FORTE scanat Tr CE NC ORI Pets UV ВОТ БҮ WG ADDITA Or A UCC NORTON ОМА Gnd мезон uA НЕ 
DIE ORT tates te ыы PROPER CLOSURE TE GAB CLADE EVACUATED AND А ТЕМА TON Gad ЖАР E 
осо POLLO) UE CON. EVACUA TON МО RETEST Tee ORAM wA BE отеля TURNER БОША TO T CLE 
Sese neces Br NOW DA BUSIE ROO RE СОЧНО Tri ANY МОЕ VA Tre О CONTHOR TOWARD Yi GLAN 
rere HROPUR PROC RQURT WOLD tt Om US TO we СТ ПА өс малыс TO ve CLEAN BAERE S PONT. ВИ WE MEARE 
томына Y ROTATE Te талы, ORUM САТО COME OREM ABOVE TO Tt YELLOW ORANGE ООО ЯЗ MAYO CTIA 
eR E wt NAME BERI) ID rd ORAL CAA O STOF А W PORTER WERE теп тт. ССИ MATCHED T REOR OF Ir 
OR coon snp Tran Wa WOULD БАП ON ATED AN МАҒЫ WOULD SONG. T s ON Аш CUNTAPS WOKLD STAAT ANC уа 
ARRAS ae edm WE самса Yu YELLOW BONS WOA O BE өлемі 


THE EXTIJUON OF THE ORANGE ОСОН WOULD BE EXPOSED TO ТЯН ГА ТН GAB. АЛУ! АВ BEFORE iN T 
RUM. ANO I1 WOULD BE PRESSURE F VACUATED Он THE GREEN DOOR BOE OF THE DAUM. А COVER 
LOCK CABE DEC TEO BY tra TRANSPARENT GREEN COVER ABOVE) WAB PLACED OVEN THE QUTMOE 
өт A BUNT, LOCKED INTO PORTION. AND NAD OFTECON EQUIPMENT TO PREVENT ANY LEAKE AFTER 
ANIER ROUND OF TESTING. THE INTERNA CLOSURE WOULD BE LOWERED. AND төс YELLOW ООО 
WOULD E OPENED | WOULD STEP INTO THE мй LOCK BETWEEN THE ORANGE АМО YELLOW DOORS. THEN 
FULL THE MOBING TOWARD МЕ ТО GRASS TI BIVALVE DEVICE OM THE NOSE, AND CONNECT THAT DEVE 
TO YE SECURE NOSNO ADAPTER LEAD ТО ТЕ RED ООО THEN THE YELLOW DOOR WOULD 08 CLOMID 
ANO LOCKED WITH EXTERIOR QASKETED LOOKS PRIDSISUNZATION AND CONT AAMENT WAS AGAIN CHECKED. 
OM ORDERS FROM THE GALLERY ON. Y (GALLERY GUPDIVIBON. PROCEED ORANGE ) THE ORANGE DOOR 
WOULD BE OPENED ANO Wt. FEEDING THE BIVALVE DEVICE INTO T ORANOÈRED тт Ос РЕНО 
A BUPPONT CARIOR THAT LOCKED AROUND TME HOSE) | WOULD ITER INTO THE ORANGICANGD INTERLOCK 
AND PLACE MY NICHT HAND Ом THE RED DOOR ANO ANNOUNCI "CONTACT" OVER THE MADIO THE GALLENY 
SUPERVISOR WOULD THEN BAY “GALLERY ЧЬИ, PROCEED RED "| WOULD SAANG TE RED DOOR 
OPEN AND TO THE MIONT STEP INTO Tr CLEAN SPHERE ANO TUAN ANO LOCK THE ORANGE DOON ВЕРНО: 
ме міне BEING VERY CANEFUL TO МОТ DAMAGE THE NONO INTERLOCK AND THE DOOR WAS CLOSED АТ 
THAT MOMENT 1 WAS STANONG INGIOE THE CLEAN НЕЕ ANO THAT CONSTITUTED DIRECT 
EXTRATERRESTRIAL CONTACT WHERE | BECAME RESPONSE FOR ЕМИ ЛЕО С ОМА ТС. PROTOCOLS | 
CONNECTED MY ACCESSORY "OSING AND COMMO LEADS TO TY INTERNAL HOSINGICOM GEL ЕС TONS 
FOLLOWING TESTING OF THE CLEAN SPWERE HOGG VLOWET AND COMMUNICATIONE, | CLOSED THE VAL VED 
TO N ORUM Офе DETACHED FROM IT, AAD LOCKED THE RED DOOR FROM THE NDIDE UBAO GALRETES 
LOCK CNW NONE ON тб INSIDE OF THE CLEAN SPIRE S ENTIY PORT PROM Тн MOMENT UNTIL. ME 
JT PROCEDURES V WOULD ВВ REE TO MOVE ABOUT THE CLEAN SPHERE. WITHIN PROTOCOLE ANO WOULD 
FE TO THÉ. NIGHT ANC REGN жом ANNOUNCEMENT PROCEDURES TO THE EXTRA TERRESTRIAL 


AUTOCAD DRAWING BY MICHAEL SCHRATT 8/25/2010 
PER DAN BURISCH TESTIMONY AND SKETCHES 


66 / 340 


78/570 


N 
N 
N 
^ “> 


h e ڪڪ‎ AÁ << Ж 


79 / 570 
78 / 569 | 


DULCE UNDERGROUND MILITARY LABORATORIES. 


79 / 569 68 / 340 80 / 570 


In March 2011 I received the following email: 


Lon, I read the letter you posted recently about the Dulce Labs genetics 
experiments and wanted to share my experiences with your readers. When I was 
an undergraduate studying genetics in the mid-1970s, I did a 10-month internship 
at Dulce Labs. My primary duties were on level 1, that is where I spent almost all of 
my time. But once a week I accompanied one of the junior researchers to levels 5, 
6, and 7 to collect data tapes and other documentation. I never got past the "clear 
zone" on those levels, but on a couple occasions I heard inhuman shrieks and 
wailing noises on level 6. I was told that level 6 was a psychiatric facility for 
especially disturbed patients, and that they were known to have emotional 
outbursts. 
On one occasion while we were waiting for someone to bring out the tapes, I heard 
part of a message come through the intercom, and the words are burned into my 
memory. 


VOICE 1: "CELL 34 COMPROMISED, ENTITY HAS BREACHED CONTAINMENT" 


After a pause a second voice came over the speaker: 


VOICE 2: "AVAILABLE PERSONAL REPORT TO THE BLUE ZONE FOR C&C. MAXIMUM 
FORCE AUTHORIZED." 


The guard at the desk told me and my colleague that we had to leave immediately, 

we were rushed back into the elevator before the materials were delivered to us. It 

was two days before they let us go pick up the tapes, and when we went that time, 
everything was normal. Nobody ever talked about it. I tried to ask my colleague, 
the junior researcher who was there at the time, about it, but he said he didn't 


know what I was talking about, and something in his tone told me I'd better forget 
about if too. 


After I graduated I was interested in returning to Dulce because I was really 


excited about the potential for genetic science, and Dulce had some very advanced 


equipment and knowledge - better than anything being used anywhere else. But I 
was told that there weren't any openings. I wondered if I was being blown off 
because of my curiosity about that event, if I was considered a risk. I tried 
contacting the junior researcher, but never got a response from him. - MP 


70 / 340 


Another person wrote: (THIS PERSON WORKED AS SECURITY OFFICER HERE) 

-6th Level - privately called "Nightmare Hall." It contains the genetic labs. Here are 
where the crossbreeding experiments of human/animal are done on fish, seals, 
birds, and mice that are vastly altered from their original forms. There are multi- 


armed and multi-legged humans and several cages and vats of humanoid bat-like 


creatures up to 7 feet tall. 


-7th Level - Row after row of 1,000s of humans in cold storage including children. 
B2 / 569 71/340 


Where exactly do the heavy psychiatric patients come from, and what 
kind of medical project is being promoted behind closed doors? Deep 


down in an underground biological laboratory in a mountain range? 
| better load my nukes because heads are gonna fly. /GN. 


72/340 


چ 


| A CAR TO COMPARE SIZES IN IMAGE ' 


GROUND LEVEL AT 
DULCE 
UNDERGROUND 

77 LABORATORIES. 


— GROUND LEVEL AT 
DULCE 
JUNDERGROUND 
"LABORATORIES. 


——— ——— у cm 
b. 


= 1 А [ E ` а 
22922 21, A 


Í - cf A i | 
4--: FANS | 
` к” т аш. Е 


| 


86 / 570 


«See rs. 


86 / 569 75 / 340 87 / 570 


N 
N 
N 
^ “> 


134 / 570 
133 / 569 " 


HERE FOLLOWS THE 
PHOTO SECTION 
OF THIS DOCUMENT 


*Maps. 

*Satellite Images. 
*Technical Specifications. 
*Scans. 

*Photographs. 


—SEE THE FIRST PHOTO OF THE 6-FINGERED ALIEN RACE. 


т 
* 


i 
88 / 569 77 / 340 


78 / 340 


- 


How to interact with an alien! 


92 / 570 


92 / 569 81 / 340 


95 / 569 96 / 570 


194 /-ROSWELL-COVER-UP-READING-PART -1-ONE.png (ene image data, 1456 x 1489, 8-biucotor НОВА, поп-меласеа ) 


Army Disk-ounts 
New Mexico Find 
As Weather Gear 


FORT WORTH, July 9.—J/P)—An 
examination by the Army revealed | 
last night that a mysterious object 
found on a lonely New Mexico 
ranch was а harmless high-altitude 
weather balloon—not а grounded 
flying disk, 


Excitement was high іп disk-con- 
scious Texas unti] Brig Gen. Rog- 
er M. Ramey, commander of the 
Bight Air Forces with headquarters 


Army Disk-ounts 
New Mexico Find 
As Weather Gear 


FORT WORTH, July 9-4Ф--Ап 
examination by the Army revealed 
last night that a mysterious objec 
found on a lonely New Mexico 
ranch was a harmless high-altitude 
weather balloon—not a grounded 
flying disk. 

Excitement was high In disk-con 
scious Texas unti) Brig Gen, Rog 
er M. Ramey, commander of the 


here cleared up the mystery. 

The bundle of tinfoll,  brokenj 
wood beams and rubber remnant 
of a ballon was sent here yesterda 


Roswell harbored 


The 509:th here cleared up the mystery. UA E. Ан: 
The bundle of tinfoil, broken But the general said the objects 
š th hed Ins of a Ra 
Atomic Bomb wood beams and rubber remnants wind target used to determine thd| 
G of a ballon was sent here yesterday direction and velocity of winds а 
rou by army air transport in the wake MER манаш 
р, of reports that it was a flying disk. eer dh thet ЫМ his TONA 
either stition Т , ва14-“ из 
Headquarters, vii us iu ж се ту on d because they go much high 
er than the the «ye oan | can Bee” _ 
New Mexico, wind target used to determine the 
direction and velocity of winds at NOT A FLYING DISC—Mejor Jesse A. Marcel of Houma, La., сл LIST PURSE PURSE HOLDING 
U.S.A. high altitudes. equos eset of би 509‹һ pac Group at Roswell, New od ed 


Newton, 


b F'o Worth, Texas, Arm Air | 


Warrant Officer Irvin 


I SPACECRAFT PARTS. THIS U.S. ARMY ALIEN [EVIDENCE|WAS NOT SPACECRAFT PARTS. 
SHOWN TO THE PUBLIC OR 
NEWSPAPERS. 


L w rae 


= چ 


Claes Army 
21 3 в Slacking 
+ ind (Courts Ката 


RAAF Captures Flying Saucer 
On Ranch in Rosy 1 Regi 


ист ш Мо 
Fare. v 227” 
и”: 0 


+ 4. 


Some of Soviet Satellites 
May Anend Рагу Meeting 


"7 Pus nd Washa S 
== ghey! Wage Paci в 


Alien 
alphabet 


itl: 


int 


4 
М 
| hi 


— — < —— 


TREE 


| 


DEAD A 
AUTOPS а 85 / 340 


| 
Ч 


Н#ЕЯР Z [- E 


| Aircraft | Intact, о ЯГОДА, or semi- intact аггета oi Exiryterresi: ай де үл 
Intaci device, : 
| | functional. 
Damaged | Any Mechanical o; electronic dey ісе or machine which a Ppears to be damaged but 
device. | mostly complete 
! Powcrplant. ! Devices and Machines o fragments Which ane possible Propulsion units, fuel, and 
Associated control devices and paneis, 
Шеті feg | Fragments composed 
fragments. | science and ссору, 
| Unidentified | Fragments Composed of e! 
| fragments | 
7 | Supplies and 
| Provisions, 
8 | Living сашу. е, 
2 Non-living 


ic materials of 3 Support nature such as clothing, 
ingestibles, erc 
or reasonable heal. 
ог portions of organisms, organic remains and 
Other suspect Organic mater. 
Printed matter. electronic recordings, maps. charts, photographs and film 
Any device or portion of з device thought to Бе offensive ог defensive weaponry, 


| сту, 
10 | Media. 
11 | Weapons. 


86 / 340 


апо mar Шақ ШІК. 


| Any mechanica Clronic device тйс wh | 
| у Вака! or electronic device or machine w! Ich appears 1e be undamaged аты) 


| 
(| IF-101.K 


ID. 301 р Аса $1 S4 


| DD-303.N | Аре 5154 


| PD-40-8G | Area 515; 
| 


| Arca $] 5-4 


| 


| 


| UF-I(G-M ! Ақа 5154 


| SP-33] 
| 


| 
| ЕВЕЙ 


! EBE-XO 


| Blue Lab WPL | 


| OPNAC ВВ5 01 
| Біге Lab “Рв! 
| 
MM-544 | Building 21 KBSR 
WW-010 | Ara $! 54 


| 
i 


| Exc gio 
n ON Mountains | 
> m №: + 
EU “es ·.. 


No 


PN 


Ка | | 
. a Inyo National > 5 
4 "Forest 
White Mountains 


Anse! Adams.’ £N к. Wilderness. 
Wilderness а - ^ 


Sierra National 
Forest 


ў, 


John Muir қ 
Wilderness па | 


2 


| Sequoia- Inyo-Mountoins 
Kings Canyon Wilderness 


4 Wilderness 


\ 77 бедибіо 
4 National 
Park 


Golden 
") ж Trout Wilderness 


Porterville | 


' Sequoia 
National 


Flectronic 
Combat 
Systems 

(ECS) 


Death Valley 
National 
Park 


Р 
, Basin апа 
Range 
National 
Monument 


Nevada ^ 
Test and 
51 Training 
Nevada 84 Range 
National (NTTR) 


Security 
Site Desert 


National 
Wildlife 
Refuge 


Pahrump 


Forest Naval Air 
Warfare 

Center ( 
China Lake | “89 / 340 Kingston 


копа 


[ET UNIT 


PDF -HEAVY NATIONAL SECURITY= 
Top Secret - Map of AREA 51. AREA Jl 
Used by the Central intelligence agency. FIELD ELEVATION 4.400 FEET 


The CIA Project OXCART. 


- -- 


7 ЩЕ: uu "yoy alt =" š 
ORY LARE BED 


RUNWAY EXTENSION РАЦ Т 


e ки 
= - 6 үи 
* ° ж 


STATIC TEST AREA 


Conca It 


капо AREA RUNWAY 1465 FEET 


STATIC TEST AREA 


4 


e Mw шиа 


© i itita IOP Ж#Н ШШ | 


Delamar 
, м й 


E age ж” $ 
و‎ Indian} [Springs 


18. Maintaing the{ MAJESTIC |security has been successful in part because of 
cempartmental function of classified activities ef the level achieved 
by the security system оГ the Manhattan Prefect, апё new legislation 
protecting nuclear weapons development. 


ecurity operations о [usr | it has been necessary 

dividuals who would comproifiise the intelligence 
while aistasteful L tires, the ure of 
easures have been executed, The untirely death с: ocere tary 
og deemed necessary апі rovt іа Ire 


12, General Statement: If such a evitis іп cU ore sb pas Мы: = E зи 
re the ^uslic!'s trust i a 


+ 


hat the following veuld eccurr 
pattern i ҒаліЛілзг--спрізумепі, ol suis raive agents; infilt*rition 
tactics; incitement of disorder and chacs to disrupt normal беспесу and 
thereby to undermine popular confidence in похегиееть and leaders; seizure 
of authority without reference to the will of the people." 


17 
13. | Referenced RIPORTI TO ТИТ соу т, ҒАГГ) 1-7, dated 
19 September 1947, mentions: "In сос ге with your directive в е « of 


u i77, the attached We PONT eet руа AUCTION із perceopbinlly 
Submitted. Іп consonance vith your instructior азер FE ізі»; 
1 


[i 
5; 
Treasury, Маг and Каму Depnrteonis or 010i: n D bes ul set 
finding miscion concerniec the гай ту of зт! ТОНЕР тт. То 


‚ ан абаке fron "ет ther сезсе :, > 
. 
: 


principle areas vere vicited, Тес Safe ef farts сете ede ta v 
all levels 27 ceionticis ] ee eS wq ct tuom «қ жө ¥ Be Me ЖЕ 
РА X] lasek баба ома аи Се а БАР ыла UU 


held with 

1,200 remore Š 1 
were received and considered, The report precenbs эсил а (25 ol 
background my estimates of tho situation, current апі projec 
ІЙ U,S,, ani U,K,, and recenmeniations deemed ta bo gout eourc 
^50 for formulating plans and policies concerning defenses of 7? 
2 countries of the United States." $. 


li, Аз a result of the Arining торе" President was compelled to 
sign into law the l'ational Security “ct sf 17347 vhich саге inte effect 
on 19 September, This did not help the DCI in carrying out the 
directives of the NSC in matters ef intelligence collection concerning 
the flying saucer problem. Tho Intelligence Advisory Peard wes rot 
allowing the new СТА to š iain ыы 

s saucer data 


= 


95 / 340 p Зареди 


Іледе a 


108 Ж 


107 / 569 7 | | $ 109 /-570 


`a. 


RUSSIAS NEW ELECTRONIC WARFARE IMAGES. X-RAZE.COM 


NN 


¥ 


Russian 
electronic 
warfare 
worldwide. 


1P501 


— 


97 7340 


The RF Hearing Ellect is explained and analyzed as a 
thermal to acoustic demodulating process. Energy absorp- 
поп ш a medium, such as the head, causes mechanical 
expansion and contraction, and thus an acoustic signal. 


When the expansion апа contraction take place in the 
head of an animal, the acoustic signal 1s passed by conduc- 
поп to the inner ear where it is further processed as if it were 

‚ап acoustic signal from the outer саг. Animal = Human. 


1117/5 


Ask them what the Magnetron Cannon is for? 


WARNING! 


RADIATION HITS YOUR BRAIN THIS WEAPON DESTROYS THE 


BRAIN BARRIER, SO YOUR BRAIN 
LIES OPEN TO ATTACKS OR EASY 
INTRUSION. 


CAUSING 


Unrepairable damage. 


This is one of the pictures 
YOU are not supposed to 
see according to the 
Department of Defense. 


THE PHOTO WAS ACCIDENTLY RELEASED 
BY THE U.S. DEP. OF DEFENSE AS THE 
FIRST SATELLITE SELFIE. E 


The worlds first 


ATTACK 
SATELLITE 


Жж 'SELFIE'.......... 


oecona 
а LAT 


| | “ее ы . Engaged in Work 
ивозивознано 'Busy' Thinking 


Relaxed 
a Images Visuals 
.. Self-Introspection 
Day Dreaming 


Between Awake/Sleep 
\ Th MAN A- Deep Meditation 7 
ДЫ "Y Y —əboo Flow of Ideas/Creativity 
Altered States 


Theta«sm)| 


1 | Unconscious 
_ Very Deep Sleep 


Delta «=. 


If one transmits signals or disturbance on above frequencies, 

then your brain can't function alright. 

And guess what. There's a lot of transmitted noise in those frequencies, 
meaning your brain has trouble giving you deep sleep. 


110 / 569 99 / 340 112/570 


United States Patent пя 
Brunkan 


[54] HEARING SYSTEM 


Wayne B. Brunkan, P.O. Box 2411, 
Goleta, Calif. 93118 


Appl. No.: 202,679 


Inventor: 


128/421, 422, 7 1/68 
References Cited 
U.S. PATENT DOCUMENTS 


3,629,521 12/1971 Puharich et al. 
3,766,331 10/1973 Zink 


OTHER PUBLICATIONS 


Cain et al, “Mammalian Auditory Responses ... ", 
IEEE Trans Biomed Eng, pp. 288-293, 1978. 


128/402.5 
128/420.5 


18 mins ago" 


13 / 569 


11] Patent Number: 
[45] Date of Patent: 


4,877,027 
Oct. 31, 1989 


Jaski, "Radio Waves & Life", Radio-Electronics, pp. 
45-45, Sep. 1960. 

Microwave Auditory Effects and Applications, Lin, 1978, 
pp. 176-177. 


Primary Examiner—Lee S. Cohen 

Attorney, Agent, or Firm—Harry W. Brelsford 

[57] ABSTRACT 

Sound is induced in the head of a person by radiating 
the head with microwaves in the range of 100 mega- 
hertz to 10,000 megahertz that are modulated with a 
particular waveform. The waveform consists of fre- 
quency modulated bursts. Each burst is made up of ten 
to twenty uniformly spaced pulses grouped tightly to- 
gether. The burst width is between 500 nanoseconds 
and 100 microseconds. The pulse width is in the range 
of 10 nanoseconds to 1 microsecond. The bursts are 
frequency modulated by the audio input to create the 
sensation of hearing in the person whose head is irradi- 
ated. 


Ә militaryhighcommand.com . Attack on Teacher May Have Been | 


102 / 340 


UNITED STATES SENATE 


Washington, D.C. 20510 


SR—Russell Building 
SD—Dirksen Building 
SH—Hart Building 


114th CONGRESS 
SUITE AND TELEPHONE LIST 
Copies Available m Sergeant at Arms /IT Support Services, SH-121 


All telephone numbers 
preceded by 22 prefix 


Vice President 
BIDEN, И. Joseph В. 
ALEXANDER. Lamar 
AYOTTE, Kelly 
BALDWIN, Tammy 
BARRASSO. John 
BENNET, Michael Е. 
BLUMENTHAL, Richard 


CAPITO, Shelley Moore 
CARDIN, Benjamin L. 
CARPER, Thomas R. 
CASEY, Jr., Robert P. 
CASSIDY, Bill 
COATS, Daniel 
COCHRAN, Thad 
COLLINS, Susan M. 
COONS, Christopher A. 
CORKER, Bob 
CORNYN, John 
COTTON, Tom 
CRAPO, Mike 

CRUZ, Ted 

DAINES, Steve 


GILLIBRAND, Kirsten E. 
GRAHAM, Lindsey 
GRASSLEY, Chuck 
HATCH, Orrin С. 
HEINRICH, Martin 
HEITKAMP, Heidi 
HELLER, Dean 
HIRONO, Mazie K. 
HOEVEN, John 
INHOFE, James M. 
ISAKSON, Johnny 
JOHNSON, Ron 
KAINE, Tim 


116 / 569 


INFORMATION 
From Outside Dial- 
Senate—224—-3121 
House—225-3121 
From Inside Dial: 
0 for Capitol Operator 
Assistance 
9 for an Outside Line 


THE POLITICAL 
AVENUE™ 


© THE GLOBAL POLITICS MAGAZINE! 


MARKEY, Edward J. 
McCAIN, John 

McCASKILL, Claire 
McCONNELL, Mitch 
MENENDEZ, Robert 


(D-MA) 
(R-AZ) 
(D-MO) 
(R-KY) 
(D-NJ) 


MERKLEY, Jeff (D-OR) 
MIKULSKI, Barbara A. (D-MD) 
MORAN, Jerry (R-KS) 


MURKOWSKL Lisa 
MURPHY, Christopher 


(R-AK) 
(D-CT) 


MURRAY, Patty (D-WA) 
NELSON, Bill (D-FL) 
PAUL, Rand (R-KY) 
PERDUE, David (Е-СА) 
PETERS, Gary С. (D-MI) 
PORTMAN, Rob (R-OH) 
REED, Jack (D-RD 
REID, Harry (D-NV) 
RISCH, James E. (R-ID) 
ROBERTS, Pat (R-KS) 
ROUNDS, Mike (R-SD) 
RUBIO, Marco (R-FL) 
SANDERS, Bemard 1-УТ) 
SASSE, Ben (R-NE) 
SCHATZ, Brian (D-HI) 
SCHUMER, Charles E. (D-NY) 
SCOTT, Tim (R-SC) 
SESSIONS, Jeff (R-AL) 


SHAHEEN, Jeanne 
SHELBY, Richard C 


(D-NH) 
(R-AL) 


STABENOW, Debbie (D-MI) 
SULLIVAN, Dan (R-AK) 
TESTER, Jon (D-MT) 
THUNE, John (R-SD) 
TILLIS, Thom (R-NC) 
TOOMEY, Patrick J. (R-PA) 
UDALL, Tom (D-NM) 
VITTER, David (R-LA) 
WARNER, Mark К. (D-VA) 


WARREN, Elizabeth 

WHITEHOUSE, Sheldon 
WICKER, Roger F. (R-MS) 
WYDEN, Ron (D-OR) 


Published hy the Senate Sersaant at Arm: /TT Summort Services 


(D-MA) 
(D-RD 


105 / 340 


ON/OFF — — 


ON/OFF — — 
ON/OFF — — 
ENTER» — — 


МО [рев sc EXEC | 
DATA үңду МЕК |4 Вет 
Tw 


J K ES FERAS FCS 


Earth перуки ка refers to эс aaa the рола == called Earth Ground. 
a 


119 / 570 


United States Patent по 
Ritland et al. 


ASSEMBLY 


L DISPENSER 
[75] Inventors: Harold М. Ritlund, Bellevuc; George 
H. Thacker, Kent, both of Wash 


Assignec: The United States of America as 
represented by the Secretary of the 
Air Force, Washington, D.C. 


[21] Appi No. 882,526 
[22] Filed: Mar. 1, 1978 
É Ist. СП ..................... FIF 5/02; F42B 13/50 
52] US. С. iscsi 09/1 B: 102/39 CD; 
33/18 E 
[5$] Field of Search ............. 102/89 CD, 344, 35.6, 
102/37.6; 89/1 819, 1 В; 343/18 Е 


References Cited 
U.S. PATENT DOCUMENTS 


[73] 


GER SSS 


А 6 
— 53 


United States Patent 
Werle et al. 


“= кра 


x E TEN 
ето o ooo UR, чь чь чь жы 


https-//militaryhighcommand.com/CENTRIFUGAL-AIRCRAF T-DISPENSER-PATENTS-from-WWW-MILTT ARY HIGHCOMMAND-DOT-COM.png 


4,175,469 

Мот. 27, 1979 

199661 8/1975 Kelly etal. e. MI/IBE 
3,899,975 8/1975 Lawrence 5... IMN/MAX 


4983703) 10/1976 Matey ss # 819 X 
4,063,315 12/1977 Schneider ct al ....... 102/35 CD 


Primary Examiner —David И. Brown 
Attorney, Agent, оғ Firm—Joseph Е. Rust; Jacob М. 


[57] ABSTRACT 

A centrifugal aerosol dispenser assembly capable of 
dispersing a cloud of particulate aerosol] material іп а 
predetermined ation, The dis- 
penser assembly в formed of two parts, а mount and а 
dispenser. An ejector mechanism having а portion 
thereof on szid mount and a portion thereof ол said 
dispeaser expels the dispenser from said moznt with а 
spin motion. А plurality of dispensing compartments 


cjection thereof releases its contents іп a predetermined 
geometrical configuration duc to the centrifugal forces 


ILA; 
"m 


1541 | POWDER CONTRAIL GENERATION 


118 / 569 


107 / 340 


THE EMERGENCY BROADCAST SYSTEM. 


- <>». 


"10 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Evolved Expendable Launch Vehicle 


The Evolved Expendable Launch Vehicle (EELV) теке 

provides to the Air Force, Navy, and the d 

National Reconnaissance Office (МКО), 

and other government and commercial purchasers of 

launch services medium to heavy lift class satellites. Falcon 9 


* 70 consecutive successful national security space 
М55) operational launches (as of March 19, 2017). 


* The Air Force certified SpaceX as ап EELV provider 
on May 19,2015. 


Mission: Provides launch services and capability for medium 
to heavy class national security space satellites. 


FY 2018 Program: Procures three Air Force launch 

services. All three are planned for competition and which 

are usually ordered no-later-than 24 months prior to the 

planned mission unless additional first time integration is 

needed; funds EELV Launch Capability (ELC) effort 

including mission assurance, program management, 

systems engineering, integration of the space vehicle with 

the launch vehicle, launch site and range operations, and 

launch infrastructure maintenance and sustainment. о 
Continues EELV launch service investment to provide GE Spa 
two commercially-viable, domestically-sourced space 

launch service providers with the objective of eliminating 

reliance on a foreign-made liquid rocket engine. 


Prime Contractors: United Launch Alliance (ULA); Centennial, CO 
SpaceX; Hawthorne, СА " 


0 


1 ^ 6 
пе ѕєраспеті 
іле »pasBlictu 


k4 
пе 


Sc ANCL) mme 
B» ^L». ору 


. ум тис 


nr neural strin ayict ON THE OTHER SIDE and each ca 
OT neural 5171 exist UN It UALR IDE, апа еасп са 


Just think of a coin С) and see how easy it is to describe what! mean with "оп the other side". THIS SHI 
GUSTAV NORSTROM. CONTRO! 


20 / 569 


www.restricteddocuments.com/1947-Photo-Look-at-the-mentalattack-dimensionalstring 


Sit 


е this im 


1. To date. For us on Earth™. 


age 
age. 


Embry, AnnMarie Oien, Duane D. Smith, J. Alex Thomson, James Pete Tucker & 
Samel G. L. Williams - Assignee, Lockheed Martin Corp. & Lockheed Martin 
Coherent Tech Inc. An imaging method and associated system for producing 
high-resolution images. The method includes illuminating an object or scene with 
coherent radiation such as beams from a laser and then, collecting scattered light 
with a plurality of subapertures rather than a single large aperture. The method 
continues with coherently detecting, such as with heterodyne detection, the 
scattered light to measure the complex amplitude incident on each subaperture 
and digitally reconstructing images from the coherently detected light for the 
subapertures. Then digital co-phasing is performed on the subapertures using an 
image sharpness or quality metric to form an image having the resolution of the 
total subaperture area. The method may also include determining an aimpoint in 
the formed image, calculating a phase screen, directing laser beams through the 
subapertures towards the aimpoint, and co-phasing the laser beams by applying 
the phase screen to form a single beam. 


USA PATENT NUMBER: Onboard spy satellite. 
US7405834 


І د‎ ha вия 
t can be found 


ong as 250-300 lometers before it snaps I ! 
_ | | Recommended actions: n it. And it is the cause ol 
— — ұма a Ses 7А | Good filtered ventilation and cleaning with chlorine. half of all the medice 
Yr изи. au UT к. | Eat central stimulants (raises your available brain energy). | pro blems. 


https://restricteddocuments.com 


122 7 570 


https://restricteddocuments.com 


г 
126/578 


To better combat ancient extraterrestrial pre-historic 
bioweapons effects, please change the trapped AIR 
... in all water tanks with a sterilizing GAS. / GN. 


T Chlorine gas. 


, E і ut di. ` + ug p<? 1 v 7 ` Е 
г. к P с o 2.” < f i ч 4 | ч . Е " * s v1 
| ; - Р 8 ^ y. ча є А | ` + N : ° > ` “Ж "1 570 


ИИ SD 


LD. 


w €‏ ت 


1 Дуо 


МТМ ato The! Bane 
ШО ГАЛ E 
44.,.% 


o 
9 
d 
ж 
с 
0 
E 
5 
о 
° 
© 
© 
Ф 
а 
О 
| 
че 
Ф 
Е 
0 
£ 
£ 


“ұлы. 
ANY 


Aw А, 
DOMUS 
$. ^J. 


42 2 


SEE THE DIRT HERE. SO IT HAS MADE 
м ISIMILAR STOPS HERE BEFORE. 


= 


FOOTPRINTS. 


Mure HUNDREDS, BEFORE 
ПТ GETS AS THIS. 


HE ABOVE SPACESHIP 
IMAGE AGAIN, TO SEE IF 
OU CAN SPOT IT. 


2 
x а 
"өү 


OU CAN SEE THAT TIME е ae 
HAS IT'S FOOTPRINT > 
OO, ON THEIR 
FOOTPRINTS. YOU CAN 
15ЕЕ THIS HAS TAKEN 


IMANY LANDINGS 
O PRODUCE. 


118/340 ee r https://restricteddocuments.com > 


W 115.00616 


ASSIGNMENT CODE 
MAJTSEO 18 


Coordinates are off. 
ERB PROGRAM CODES Points to Nellis Air F. Base 


"ҒОР BOOK" WORN ON ARM Las Vegas. 
GALACTIC POSITIONING CODES) 


ORIGIN OF P52 ORIONS ORIGIN OF P45 J-ROD'S 
The Galactic Position image to the right has 5 "arms" from middle. 
130 / 569 Same number 5 Arms, appears on Las Vegas UFO parking lot. 131/570 


> 
AAS 
y 


FROM ANOTHER CAMERA ANGLE.. 


ACTUALLY. 


“А, 


T LANGUAGE TALKS: 


The most widely spoken 


languages according to UNESCO 
(UN Educational, Scientific and E | [ | | N PEO P | Е 
Cultural Organization) are: ш 


1. Mandarin Chinese. 
2. English. 


3. Spanish. 

4. Hindi. 

5. Arabic. т 
6. Bengali. 

A RSN —You know, the easy words, like, where is the restuarant'é? 


8. Portuguese. 
от эшени Holiaw iy the fifth most taught language in the world, 
"T after English, French, Spanish and Germani 


1зСоругіһ © The website at https://restricteddocuments.com/pro/ 123 / 340 136 / 570 


Position Ukraine - the antenna points towards central Sweden. A nuclear power plant is 
required to operate an attack antenna like this. It was 60 miles away. Chernobyl 1986. The 
accident occurred on the night of Saturday, April 26, 1986 at 01.23.45, (local time) when 
reactor four, on the outskirts of the city of Prypjat, was destroyed. 

And this radio transmitter became powerless, in a radioactive area. 

This ANTENNA was so powerful that it made 'click sounds' in 

American telephone conversations, on the other side 

of the Atlantic Ocean. It was operating at 

a brain resonance frequency. 

10 Hertz. 


re 


НЕТ -- - 
raw 


136 / 569 


Чаво. 


Position Ukraine - the antenna points towards central Sweden. 
А nuclear power plant is required to operate an attack antenna 
like this. It was 60 miles away. Chernobyl 1986. The accident 
occurred on the night of Saturday, April 26, 1986 at 01.23.45, 
(local time) when reactor four, on the outskirts of the city of 
Prypjat, was destroyed. 

And this radio transmitter became powerless, 
in a radioactive Soviet Union (USSR) area. 


"um 


г 
ане aT 
» 


AS Y 

1 a а 
7 

LI 


MAE 


f 


rand 

а: А 
!] 
г 


i - 
Е жет 
+; ! ж 
= j T ж E т” А | 
=” pe « | se \ 
š z - Р и 
yo F LE : — : EP 


ма № 


РЕ 


== чай. вы жы 


| ы 
Р E 
à | i 
4 
i 


ы 
| Г 

1 | = 
— Fr 
Be. 


8 
x 
I» 


к = % г 
së L 
ME H E 
+ 
= 
* 
- = E 
а, -" - | 
» s г ва Е *— 
= Е + га Ë a 
ч — x Ре 
r 1 i 
z | | 
“тщ IJ Ë 
- . 1 
--ж - — ë 
4 
1 і 
i в. T 
k | i | 
= а ui T m = И T 
4 1 


= š! L 
d 41] 
| ] 

ye ашыш 


Ë 
ч ағы 


+ 


; Here MJ12 and the U.S. President discuss that it is okey to bend the 
From the MAJCOM МЈ-12 Fifth Annual Report. law and the Constitution "considering the nature of the threat”. 
Top Secret Document Report 


A, Demestic and Censtitutienal Issues *** CLEAR VIOLATIONS OF THE LAW. 


That's why they are Traitors today and uses 
Traitor Technology without doubt. 


recemd imdividual rights, 


К. Secial, Religieus amd Scientific 


It has been the downfall ef creat аааз amd cultures whem а mew 
reality is mot readily accepted by the ni The seclal erdor was зетеге1у 
ravaged by the last world war, with great damage te the religious derma ef 


"earth withaut emi,” thus ar а government disclesure irresponsible and 
imheremtly dongereus. The errs cemmunity would prod ictably questions > 

such a reaction as а world suffering from a Buck Regers delerium and attack 
anyone of their ewn ranks_for believing such famatay, Sciamem itself, may 
undergo а traumatic transfermatien, with belief structures im shambles, 

putting the institutiens under scrutiny by the leman, thus ereding алу 
credibility, Seience would be left with an image of credulity, лвла $ 
CRIMINALS TALK LIKE THIS. 127 / 340 [ PLANETARY TREASON.] 39 / 570 


Tele rona s ` 
дм 


съ че ШТ: 
` 


| 2 DERE Ре ДЫ: 
AMET m кала X а DSR Ме УА) ; 
г. ك‎ Ж > a" d ia 


Ж“. 


a, 


nhe 


Fita 


— —M 


q m dir 
4 ALTUS E 
я. чак ГОЛОТ. 1 


A 


URS 
ج‎ 
Ba) 4 


>; 


P. 


ма د‎ нат + Š 
рл: 
a 41% 
» n v 


4 с жер B 
[seus MEC 


[TN 
ғ 
Б 


Ы ei a 


POUT V Ау 


— 4 ++ 


и} N" 


и g я ч m ши uma ши a "m ни an нин “ г 


o 
- 
o 
Ф 
— 
G 
с» 
> 
1 
o 
70 
Ф 
= 
je 
o 
ч— 
- 
А = 
‚2 
Ф 
“- 
o 
Ф 
iz 
o 
©) 
G 
= 
S 
c 
© 
> 
Oo 
© 
со 
E 
а) 
— 
9 
Co 
жа 
CG 
— 
“Бе 
o 
Ф 
| = 
— 


u) 
е 
= 
с 
9 
> 
a 
G 
m 
S 
c 
2 
>, 
ia 
oO 
са 
ERE 
c 
9 
> 
с 
(“9 
со 
ч 
о 
2 
6 
о. 
o 
[ud 
4— 
Ф 
E 
~ 
© 
© 
o 
с 
е 
Ф 
бы 
- 


и ма B. ди ав „н. ни чи "E ни ня ни 


= ат: ‘BaS Se LI га a дн. 06 T “ааа =<. 


, [4 


ки | ан fL ЕС: На ROT BS Fr итш la. aM yor ТС - вижте РА РЕ” 
жи шщ 
н аи ки ми ищ " ч “ = и ни я > ща m uw чи ни ин ни ни ин ян на 


е 
© 
= 
& 
> 
а. 
о 
а. 
o 
s= 
“. 
o 
к”, 
Ф 
= 
о. 
E 
Ф 
> 
Ф 
— 
E 
а. 
Е 
о 
о 


141 / 570 


141 / 569 


Sew зов FOR макутх JOS = 


 ROSWELE: 


UNITED AND AP FEATURES табаға; CMAV ы» COUNTY, NEW MEXICO 


y pe Debunks Roswell Flying Disk 


As World Simmers With Excitement 


Reds Blame . к 
LS-Britain For Officers Say Disk | 


Greek Situation 15 Weather Balloon 


Russian Minister 


Ses err Men, SHERIFF WILCOX TELL 5 THE LIMEYS OBJECT FOUND 
re Causing Trouble 0% FOSTER RANCH 
CAUSES EXCITEMENT 


American Leaguers Eke 2-1 Thirteen Nations 


Victory From National Stars Accept Bids To 


QUU a a е ~ Коп Aid Talks 
f oa lewis Miners | Still Hope That 


реа Delum Торис | Kudeti pe. 
With Fat Raises сет 


league’) когу tare over 

75 Pet. of the Workers 2727 ^ 
, Return But Southern «o 
^ Operators Won't Sign ois 
7 = ^ ‚ WASHINGTON за Г t Seaton 


taxe av 


кагу 


And eto! the Firbid АМ Fere 
WeadquaMu la Fori Werte за 
fore’ ік. the бай жы Geta 
Md жығу UNAM ә mieu дъна 
we өйө سم ^ أا‎ aghu 
— «біз cedem merr lee 
rere. am 1» жәғеті Бер. 
жымы company тва Pee) handi- 
me тайн ін өзге; Өк) тама 
ranty — ыы D. Ae 
be ж- 

езе" after (е romaine were 
mamini ia Ale Ferre nama 
м”. ғы 19» Вы М. Матея 
ma, (he злее тане 1344 مها‎ 
боғы. а + 


1% THIS А FLYING DISC? сит e" 
š Fran Kf sc ^ 
had pho* ty ы + 


Awan унау, Press 
Berta жола aiid 
d Uus ебе تخا‎ 


red 
* Yankees. 
ghe (annual w n. 


n iom fies 


“ * er 4» by RAAF 03 
aat 4% eere ú жаз жертану by Waters bi 
І м. a Motors 


Tax Slash ВШ — 7 
Sails Thru House у 2 Š к, я 
By Large Margin 2 sg ва ча SS, 


seer ua 


exe rk re Тре хом Тена іл New Мез 
Fnomkh “Хес үйек) e E tr fiat EA ET X C 
3 To Override Another SS, DEC пича 
КУП any эл соо Vb Ub à Presidential Veto а и ife bum ac art merely are 


quee (hm thee Dem as 
Me am] Ww Chet F 
"MASS 


WASHINGTON, (m — The re 
publ.) packed вое or eer ie- 
же егіз Iur deme 


каш cae а House Bafles стоса RT 


miserie: QverDocument d ме 
Оп Fascism Flying Disk Transforms Sheriff s 
шеш ето Office To International Newsroom 


eet Sox et Bevin Praises 


т Senate Confirms 


ә 


2 Š Connally Man Over 
O'Daniel Appointee 


1 


w & ipu сық” «жәе 
wel «Гоу office or 


Grange leader : Vis ei таа Делез mum ТТ 
Proposes Ceilings : CUR 225 Marshall Plan ppp 
On келердің Wage Sider evt x UL ED 

папа „ЗАО СЕРДА рис 


< seta беса» Chee QU the du Бая а Kir, mom: 


* 3945 сорта” и 


ex ЕТТІ Carrizozo Man 
е Sees Flying Disk 


з» с. CANRIZX APO г--Мы% sim 
wet 


stormave ^ ^ ^e 


ож» 


ere eom. mis Joe Massey Spois 
riot eh rms Disk Over Roswell 


on Aur - 


sede betwee 4494 ned алет 


s. E RAAF Take 16-0 
а watt ict eider ден теч Win From Sportsman wat лаш 


#1 Ge Том «жоғы Che @ s 
almay owed етт Не Denies із 
93264 iru мееее» > Rarer ^ 


1947-The Newspaper Roswell Morning Dispatch's front-page the day after, 
the USA Presidential Order of a Military Cover-up already had been 
administrated. July 9:th 1947. 


130 / 340 


144 / 569 


Photo from Planet Mars. See the shadow here. 


is 
сл 


Wonders of Universe 
January 5 at 10:03 PM "434 


This volcano mountain is on Mars. It is called Olympus Mons. It is the tallest mountain in our 
solar system. It is three times larger than Mount Everest ( 26 km long and 600 km wide 
Amazing. 


D Jeremy Brown 
Great pic. Funny how we get blurry moon pics but super hd mars pics. 


—] think it looks like a downed or crashed flying 
saucer, that has been through some sand 


storms, on Planet Mars. 
Perhaps it has been there since ancient times. 


146 / 569 е 


x 
Ф 
= 
е 
= 
P 
° 
1 


HIGH FIVE 


ON LAST PAGE: ALIEN POETRY AND WISDOM. 


Three truths and realities we must accept: 
1/ We are all one of the same kind. 


2/ We are all Gods inside. 
3/ We are all unique and special. 


It believes itself to be our Creator. 


136 /34& 


Here I Пе and control] the future, as 
you see. I am your father. We can 
rule the galaxy together. HIGH 
FIVE! wrew.alien|947.com 


Time is an illusion. 

The only thing that matters is the here and now. 
Not the past. 

Not the future. 

Time is an illusion. 


[You control the present]therefore you control the 


you control the future. Your future. 


past, therefore 


CY y wx SI 
diei p ` 


| 0 Ке | 1 
- 1 П 
7 A | 2 
- : | ; 
М I 1 I | А | 
Y | ç | iP / 
N / /% " N у / 
AN aiv VUE г» ES" ب‎ 
` / 5 
N / Ж 
Wf 


U.S. Department of Defense 


148 / 569 137 / 340 148 / 570 


«СО. 


149 / 569 138 / 340 149 / 570 


Wig 


N аР, PUn А A 
) қалап SOF AN 
k ; 9 "ака ” у A 3 к 
a Y Q 7 7 % Ж / 
` Qe. М, w 
AN Was. о: 


ОМ МЕХТ РАСЕ: 
—PERHAPS A EXTRATERRESTRIAL WEAPON. 
THE SUN'S ARRAYS WOULD SPREAD ITS LIGHT ARRAYS 
WIDER THAN THIS LIGHT BEAM, IF THEY TRAVELED 


AS ON IMAGE. 


150 / 569 150/570 


151 / 570 


N 
N 
N 
^ “> 


2/57 
152 / 569 | B 


N 
N 
N 
^ “> 


1 70 
153 / 569 7 


TYPES OF RADAR 


Primary Radar Secondary Radar 


Patent No.: US 6,470,214 B1 
Date of Patent: Oct. 22, 2002 


METHOD AND DEVICE FOR 


IMPLEMENTING THE RADIO FREQUENCY 
HEARING EFFECT 


Inventors: James Р. O'Loughlin, Placitas; Diana 


L. Loree, Albuquerque, both of NM 
(US) 


Assignee: The United States of America as 
represented by the Secretary of the 
Air Force, Washington, DC (US) 


AM Modulation with Fully Suppressed Carrier for 
the Intelligible Encoding of Speech by the 
Invention for Compatibility with the RF Hearing 
Phenomena 


The equation for AM modulation with a fully suppressed 
carrier is given by equation (10), below: 


Иж (о t) 


е жың ” 123 /570 


PDF SECTION: 


UNITED STATES PATENTS. 


155 / 569 


United States Patent 9 

Mardirossian 

[54] COMMUNICATION SYSTEM AND METHOD 
INCLUDING BRAIN WAVE ANALYSIS AND/ 
OR USE OF BRAIN ACTIVITY 

[75] Inventor: 


Aris Mardirossian, Germantown, Md. 


[73] Assignee: Technology Patents, LIC, Derwood, 
Md. 


[21] Appl. No.: 09/206,365 


[22] Filed: Dee. 7, 1998 
[51] MEGI ete ee AGIN 5/00 
[52] US e аа RARO 600/544; 600/545 
[53] Field of Search sss 600/300, 544—545; 
128/897-898, 904, 905 
[56] References Cited 
U.S. РАТЕМТ DOCUMENTS 

5,059,814 10/1991 Mead eL al. . 

5,118,006 — 6/1992 Lynch ct al. . 

5,136,687 — 8/1992 Гаспар ct al. . 

5,224,203 6/1993 Skeirik . 

3,303,703 — 4/1994 Nenov. 

5,325,862 7/1994 Lewis ctal.. 

5,461,699 10/1995 Arbabi et al. . 

5,522,863 06/1996 Spano el al. . 


77 


— 
C 3 


TRANSMITTER 
3 


US006011991A 


6.011,991 


111] Patent Number: 
[4] Date of Patent: 


6/1997 Skeirik . 

2/1998 Laupel. 

2/1998 Gonzales . 

3/1998. ВТО oca etes deerit 128/905 
3/1998 Itil ct al. 600/544 
4/1998 Rogers ct al. . 

451998 Flanagan et al. . 

3/1998 Lynch ct al. . 

5,791,342 8/1998 Woodard ................................. 600/544 
5,816,247 10/1998 Maynard . 


5,640,493 


Primary Examiner—Cary O'Connor 
Assistant Examiner—Michacl Astorino 
Attorney, Agent, or Firm—Joscph А. Rhoa 


[57] ABSTRACT 


А system and method for enabling human beings to com- 
municate by way of their monitored brain activity. The brain 
activity of an individual is monitored and transmitted to a 
remote location (c.g. by satellite), At the remote location, the 
monitored brain activity is compared with pre-recorded 
normalized brain activity curves, waveforms, or patterus 10 
determine if a match or substantial match is found. If such 
a match is found, thea the computer at Ше remote location 
determines that Ше individual was attempting to communi- 
cale Ше word, phrase, or thought corresponding to the 
maiched stored normalized signal. 


8 Claims, 3 Drawing Sheets 


HOM 


19 


! 


27 
UNER 3ر‎ 


! 
= — 43 
AMPLIFIER -QuailzFR |,/29 
Г 45 
pue "v^ 
ANALOG SIG. | осморисатов T 
ا‎ 2-3 
PARALEL TT 
SERIAL CONVCETFR 
р Ж .س‎ 236 
NEUTRAL DZIN-ER.£AVER 7 
NETWORK 
ANALYSIS |. pamm 
COMPL ER | DECODER T 
ud u 
_ DESCRAM3I ER 
— ЖӘНЕ cola 
DIG. ESTIMATE 
143 / 340 


Jan. 4, 2000 


155 / 570 


U.S. Patent Jan. 4, 2000 Sheet 1 of 3 6,011,991 


ANALOG SIC. 


PARALLEL TO 
SERIAL. CONVERTER 


NEUTRAL 
NETWORK 
ANALYSIS 
COMPUTER 


156 / 569 144 / 340 156 / 570 


U.S. Patent Jan. 4, 2000 Shect 2 of 3 6,011,991 


rio. 2 


INPUT 


d 


51 
DISPLAY PROCESSOR 
STORAGE OF 


MANY INDIVIDUAL'S 


55 


COMPARATOR 


RESPONSES we 
57 
НО. 3(a) FIG, 22 
JOE (NO) JOE (YES) 


157 / 569 145 / 340 157 / 570 


U.S. Patent Jan. 4, 2000 Shect 3 of 3 6,011,991 


FIG. 3(c) FIG. 3(d) 


FIG. 3(e) FIG. 3(f) 


Afr чый» 


158 / 569 146 / 340 158 / 57 


159 / 569 


6,011,991 


1 
COMMUNICATION SYSTEM AND METHOD 
INCLUDING BRAIN WAVE ANALYSIS AND/ 
OR USE OF BRAIN ACTIVITY 


This invention relates to a system and method for 
enabling human beings to communicate with one another by 
monitoring brain activity. Іп particular, this invention relates 
10 such a system and method where brain activity of a 
particular individual is monitored and transmitted in а 


2 


toring the firing of one or шөге brain nodes or synapse 
type members) on the first human being; 

detecting brain activity of the first human being using the 
at least one sensor, and transmitting the detected brain 
activity to the satellite as a signal including brain 
activity information; 

the satellite sending a signal including the brain activity 
information lo the second location; 

a receiver al the second location receiving the signal from 


wircless manner (с.р. via satellite) from the location of the 10 ihe salellite a Me M UE жаққан 
rois - ; a he satellite and forwarding Ше brain activity informa- 
individual to a remote location so that the brain activity can tion in the signal to the computer; 
be сотршег analyzed аі Ше remote location thereby : M : UM 2 . . 
enabling Ше computer and/or individuals ai the remote comparing, the received brain activity information of the 
location to determine what the monitored individual was first human being with normalized or averaged brain 
thinking or wishing то communicate. 15 aclivily information relating to the first human being 
In certain embodiments this invention relates to the from memory; and | | 
analysis of brain waves or brain activity, and/or 10 the determining whether the first human being was attempting 
remote firing of select brain nodes in order 10 produce a to communicate particular words, phrases or thoughts, 
predetermined «Несі on an individual. based upon the comparing of the received brain activity 
20 information to the information from memory. 
BACKGROUND OF PHL INVENTION In certain embodiments, the invention includes the Tol- 
[Lis known to monitor brain activity by way of electro- lowing step: asking the first human being a plurality of 
encephalograph (LEG) methods, magnetoencephalograph questions and recording brain activity of the first 
(MEG) methods, and the like. For example, sec U.S. Pat. human being responsive to the plurality of questions in 
Nos. 5,816,247 and 5,325,862, the disclosures of which arc. 25 the process of developing said normalized or averaged 
both hereby incorporated herein by reference. As discussed brain activity inlormatiou relating to the first human 
in the '247 patent, an LLG may be recorded from a number being stored in the memory. A database їп а memory 
of pairs of scalp electrodes and processed according to may include, for cach of a plurality (c.g. onc hundred 
known software. Such software and/or hardware acquires or thousands) of individuals, a number of prerecorded 
both processed and unprocessed EEG data and may record 20 files each corresponding 10 a particular thought, attempt 
попа disk. l'he records may be replayed and statistics of the lo communicate a word, attempt to communicate a 
on-line measures made on suilable sections placed in cal- phrase or thought, or mental state. Measured brain 
egories predefined by a user. This may utilize Ше form of activity of a given individual may be compared to files 
database of statistical measures of brain activity. from that database of that individual to determine what 
Unfortunately, neither the *862 nor the "247 patents disclose 35 the individual is attempting to communicate or what 
or suggest any methods by which humans can communicate type of mental state the individual is in. 
with one another by way of monitoring brain activity. In certain embodiments, the plurality of questions are the 
U.S. Pat. No. 5,719,561 discloses а communications same question. | . . | 
device and method, the entire disclosure of the "561 patent In PPM bodiments, the plurality of questions arc 
hereby being incorporated herein by reference. The 7561 29 different questions. | . 2, Е 
patent discusses a method and device for vibromechanical In certain embodimen ts, the invention includes the мер ol 
lactile communications adaptable lor use by individuals to normalizing or averaging recorded brain activity responsive 
recognize alpha numeric messages in a language or in other toa given qu estion or set of questions mn developing the 
symbols known to them. The “561 patent discusses using, a normalized or averaged brain activity information relating to 
series of sequentially firing vibromcchanical stimulators 45 he first human being. | | EE 
vibraling agaiusl а suitably tactile sensitive surface of the It 1s an object ol this туепйо to enable brain activily ol 
wearer (e.g. skin) to induce a phenomenon of illustration of a first human being to be monitor ed, with the activity being 
lincar continuity. Unfortunately, the 561 patent requires the transmitted to a remote location so that individuals and/or a 
use of burdensome and complex vibromechanical tactile сотршег at Ihe remole location can determine what the first 
devices, and is not suitable for long distance communica- 50 human being was thinking or intending 10 communicate, In 
пот Ë such a manner, human beings can communicate with one 
[Lis a purpose of this invention to address any or all of the 5 : ia monitoring or brain activity, and transmission о? 
above-identificd problems in the prior art, as well as other р Аш: her obiect ol this i | | T 
problems which will become apparent to the skilled artisan _ EN E id ji ect ا‎ lo = 
from the following detailed description of this invention. 55 monitored brain activity from one location lo another in a 
v wireless manner, such as by IR, RF, or satellite. 
SUMMARY OF THE INVENTION It is another object of this invention to provide а system 
ЕД "T D a із ғар құт ч 5 capable of identifying particular nodes іп an individual's 
кол оз 2... brain, the firings of which affect characteristics such as 
Eus 5 е ас. $0 appetite, hunger, thirst, communication skills (e.g. which 
municating comprising the steps of: ее Ë Pepe 
DER : I Е nodes are utilized to communicate certain words such as 
providing a first human being at a first location; “уса”, “no”, or phrases such as “I don't know", “I'm not 
providing a compuler al a second location that is remote sure", or numbers such as “one”, “iwo”, "ten", “one hun- 
Irom the first location; dred” and the like), thought processes, depression, and ihe 
providing a satellite; $5 like). When such nodes are identified, they may be specili- 
providing at lcast one sensor (preferably a plurality—c.g. cally monitored by onc or more sensors to analyze behavior 
tens, hundreds, or thousands, with cach sensor moni- or communication or words, phrases, or thoughts. In other 
147 / 340 


159 / 570 


160 / 569 


6,011,991 


3 


embodiments, devices mounted to the person (c.g. under- 
neath ihe scalp) may be energized in a predetermined 
manner or sequence to remotely cause particular identified 
brain node(s) to be fired in order to cause a predetermined 
feeling or reaction in the individual, such as lack of hunger, 
lack or depression, lack or thirst, lack of aggression, lack of 
alzheimer's disease effects, or the like. 

Brain node firings are the basis of thought and mind 
processes of individuals. Certain embodiments of this inven- 


4 


network techniques, for the purpose of receiving the moni- 
lored brain activity signals, transforming the signals into 
useful lorms, training and testing the neural network to 
distinguish particular forms and patterns of physiological 
activity generated in the brain of the monitored individual, 
and/or comparing the received monitored brain activity 
information with stored information relating to that indi- 
vidual in order to determine what the individual is attempt- 
ing to communicate. 


tion enable such brain firings and behavior to be captured by 15 This invention further fulfills the above described needs іп 
an external device. It is an object of this invention to utilize the art by providing a method of affecting a mental or 
a normalization or normalizing curve (or wavelorm or physiological state of an individual, the method comprising 
paltem) based upon monitored brain аспуйу to detect or the steps of: 

determine thought processes by the monitored individual. In providing at least one firing device capable of being 
such a manner, individuals can transmit. by satellite what 18 energized on an individual; and 

they are thinking or intending 10 think via their monitored energizing the firing device to cause the firing device to 
brain activity, without the need to talk or write down cause a particular or group of brain nodes to be fired in 
information. . "" T Ж the individual in order to allect the menial ог physi- 

Each individual has a distinct pattern of brain node firings ological state of the individual. 
= brain activity. Each person is believed to be different in 20 In certain embodiments, the method including the step of 
Unis regard. Thus, а separale brain activily file may be stored providing the at least onc firing device on or under the scalp 
Лео [бг ш individual, ids analyzed Mace pared of the individual in proximity of the brain of the individual. 
to received brain activity from the monitored individual in In certain embodiments, the method including the step of 
order to determine what that individual is thinking oc identifying at least one brain node related to the mental or 
ацешриар to communicate... T š — E physiological state intended to be affected, targeting the 

It is an object of this invention to utilize brain monitoring identified brain пос, and energizing the firing, device or 
and transmission of monitored brain activity for lie detection devices to cause Ihe identified прав to be fired ir order 1o 
and/or human communication. . . . affect the mental or physiological state of the individual. 

It is another object of this Invention to formulate or In certain embodiments, the method is utilized to cause 
build-up a file lor each individual based upon pallens 30 the individual to be one of less hungry, less thirsty, less 
recorded in response lo that individual answering or anxious, and less depressed. 
responding № numerous predetermined questions with In certain embodiments, Ше remote node firing devices 
known intended responses. Subsequently, monitored brain are electrically energized and generate electromagnetic 
activity from that individual my then be compared to waves which cause a plurality of brain nodes to Бе fired. 
information stored corresponding lo ша individual lo deter- 35 Тр invention will now be described with respect to 
sa is - the и E ч mg die m 2 certain embodiments thereof, along with reference то the 
is intending to communicate in the monitored brain activily. AR Иек i eee ЖИ 
Thc cipher’ the level of detail of the file, the higher the қа ЗЕ Пон 
of potential communication by certain embodiments of this IN THE DRAWINGS 
invention. 40) 

AL least one sensor on the scalp or skin iu certain 116. 1 is а block diagram illustrating the system and 
embodiments provides signals representative of physiologi- method according to a first embodiment of this invention. 
cal activity generated in the brain of a monitored individual. FIG. 2 is a block diagram illustrating the neural network 
A data acquisition device receives the signals representative inclusive computer of the FIG. 1 embodiment of this inven- 
of the physiological activitly generated in Ше monitored 45 (оп. 
brain, and transforms the signals into a pattern OU GUIS: 1168. 3(a)-3(f) are exemplary graphs of monitored brain 
corresponding, to the monitored brain activity. This is then activity of different individuals, with, lor example, FIG. 3(a) 
transmitted (c.g. by satellite) то a computer located ага illustrating monitored brain activity of a particular indi- 
remote location, with the monitored brain activity райетп or vidual who is attempting to communicate the word "no" and 
curve being stored in a memory at the remote location. lhe 50 PIG. З(Б) illustrating monitored brain activity of the same 
computer then causes the received pattern or curve inlor- individual when that individual is attempting to communi- 
mation to be compared with stored brain activity pattern cale the word “ves.” 
information rclating to the monitored individual in order to I 
determine (a) whether the monitored individual is lying іп DETAILED DESCRIPTION OF CERTAIN 
response 10 a particular question, or (b) what the monitored 55 EMBODIMENTS OL THIS INVENTION 
individual is communicating or attempting to communicate. 

Another object of this invention is to utilize normalization Referring now more particularly to the accompanying 
curves representative of received brain activity patterns from drawings in which like reference numerals indicate like parts 
the monitored individual, and to compare the received throughout the several views. 
normalized data with normalized brain activity pattern or 60 here are significant individual differences in electrical 
curve data stored in memory relating to that individual. The and magnetic activity in the brain. Brain node or synapse 
usc of normalization curves in one or both of the individual's firings arc chemically and/or electrically caused and/or 
file and received brain activity improves reliability, related. Some characteristics of brain activily may be rela- 
accuracy, and efficiency. lively stable when measured from day to day. Brain 

In certain embodiments of this invention, the compuler 65 responses lo sensory stimulation (e.g. visual, audible, 
located at the remote location includes a neural nctwork olfactory, gustatory, ctc.) as well as higher order cognitive 
suitably programmed in accordance with known ncural processing (c.g. decision-making or thought/word 

148 / 340 


160 / 570 


161 / 569 


6,011,991 


5 


communication), can be examined in great detail using а 
variely of recording procedures. А recording of brain elec- 
trical activily is called an electroencephalograph (EEG), and 
а comparable record of magnetic activity is called a mag- 
nctoenccphalogram (MEG). When human sensory systems 
are stimulated by a particular event (a given sound or optical 
ellect) or when a human wishes to communicate a particular 
word or phrase (c.g. Ше word “yes” or the word “по?), there 
is a predictable sequence of processing that occurs in the 
brain. This processing generates an event related potential 


6 
offers a method for finding complex, поп-Шасағ relation- 
ships in large dala sels, even when the nature of the 
relationships is поі known in advance. Neural network 
technology is implemented sometimes using computer soft- 
ware programs, but may also be hardware implemented. 
Neural network theory, and detailed descriptions of specific 
techniques, are available in numerous books and articles set 
forth in the aforcsaid '862 patent, as well as in, for example, 
any of U.S. Pat. Nos. 5,136,687; 5,059,814; 5,461,699; 
5,737 485; 5,224,203; and 5,640,493, the entire disclosures 


that can be recorded from the scalp beginning shortly after ü of which are all hereby incorporated herein by reference. 
the onset of the stimulation, and lasting Гог approximately Such neural computing systems have a capability to learn 
0.5-4 seconds after the stimulation. These potentials сап be features of data scts and classify same into cither unknown 
cepeatedly generated from individuals given the same stimu- or predetermined categories. A variety of neural network 
lus or wishing to communicate the same word or phrase. Іп |, techniques may be ulilived to classify event related 
cerlain embodiments of this invention, brain activity may be potentials, evoke fields, or any other type of pattern corre- 
repeatedly sampled, and response patterns averaged by way sponding to monitored brain behavior. Іп most. neural 
of a normalization curve or the like. Comparable recordings networks, input values are adjusted through a series of layers 
of averaged or normalized magnetic activity may be referred by а series of transforms and weighted so that output 
to as evoked fields. Neuroeleciric and neuormagnetic 4, calegories are correctly predicted. Thus, а neural computing 
recordings are subsets of general measurings referred to as system herein may be utilized 10 receive monitored brain 
biocleetric and biomagnetic measures, These measures refer activity and based upon predetermined stored and/or learned 
to recordings which may be made from different types of information, determine based upon the received information 
tissue including neural, muscle, heart, ete. For example, what word, phrase, or thoughts the monitored individual is 
LLG, evoked potentials (EP), MEG, position emission 4; allempting to communicate. In such a manner, the monitor- 
tomography (PET) of glucose, or single photon emission ing of brain activily may be utilized to allow individuals to 
computed tomography (SPECT) may be used to monitor communicate from onc location to another, with the ncural 
brain activity in different embodiments of this invention. computer or апу other турс of computer analyzing thc 

Event related potentials have been shown to be stable and monitored brain information (e.g. via comparison with pre- 
unique lo individuals. See U.S. Pal. No. 5,325,862, which is 3, viously recorded brain activity of that person) and outputting 
incorporated herein by reference. Although Ше actual shape information indicative of the word, phrase, or thoughts 
of such potentials varics considerably from individual to which Ше monitored individual is attempting to communi- 
individual, there is stability within individuals over time for cate, 
individual wavelorms. Sources of these potentials and varia- 116. 1 illustrates a particular monitored individual 3 
tions thereof include individual differences in brain anatomy 55 according to an embodiment of this invention. Individual 3 
and dillerences in the way in which information is processed includes a head 5. As illustrated, sensors 7 may be attached 
by cach individual. Thus, it is feasible hercin to utilize or otherwise disposed adjacent to the scalp or skin of the 
monitored brain waveforms for the purpose of determining individual 3. Sensors 7 detect and monitor brain activity of 
whether an individual is lying or not, or what word or phrase individual 3. Sensors 7 can detect event related potentials 
a particular individual is altempting to communicate ao and/or event related fields (i.e. ERPs ог ERIS). Optionally, 
(without the need for writine information down or sensor 7 may bc utilized to detect any other tvpe of *brain- 
speaking). print” indicative of brain activity of individual 3. 

Thus, evoked fields and/or event related potentials сап be The monitored *brainprint" of individual 3 is forwarded 
ulilized as classifiers for several purposes. l'or example, іо a small transmitter 9 which is preferably embedded in the 
because these potentials and/or fields are relatively unique іо 45 skin of individual 3, or in close proximity to individual 3. 
individuals, an individual's evoked field or event related ‘Transmitter 9 causes the monitored "brainprint" information 
potential (or brainprint) can be utilized to determine what detected by sensor 7 to be transmitted by way of antenna 11 
thoughts an individual is communicating or attempting to as wireless signals 13. In certain embodiments of this 
communicate given knowledge of the identification of that invention, signals 13 propagate through atmospheric Пее 
individual and previously recorded patterns associated with 50 space in the form of uplink satellite signals toward satellite 
that individual communicating predetermined wards, 15. Satellite 15 receives signals 13 and then redirects those 
phrases or thoughts. Because there is a remarkable degree of signals back toward Earth as signals 17 which include 
stability in individual waveforms of a person over time, it is information thercin (analog or digital) indicative of the 
possible to identify changes in individual event related monitored brain activity of individual 3. Signals 17 are 
potentials and evoked field patterns which сап be utilized to 55 received by antenna 19. Antenna 19 and individual 3 are 
determine when an individual is lying, or impaired in апу both preferably located on Earth at different locations. In 
way. certain embodiments, antenna 19 is located at a location 

There arc numerous neural networks in the brain, these remote [rom individual 3. l'or example, individual 3, sensor 
networks having complex inner connections and non-linear 7, transmitter 9, and antenna 11 may all be located in Lurope 
response patterns. Relationships between the latencies and 60 while receiving antenna 19 and computer 21 may be located 
amplitudes of event related potentials and evoked field іп the United States. 
waveform features have become well understood. In FIG. 1 illustrates both a digital embodiment 23 and ao 
addition, there are many individual variations in waveform analog embodiment 25 of receiving systems. Ширег may be 
morphology. Computing techniques modeled after brain utilized. When signals 17 include digital information, they 
neural functions are known iu Ше arl. They аге typically 65 are received by antenna 19 and forwarded 10 tuner 27. ‘The 
referred to as neural network analysis techniques or com- signals are processed through equalizer 29, demodulator 31, 
puters. Neural octwork analysis computing technology parallel to serial converter 33, deinterleaver 35, decoder 37, 

149 / 340 


161 /570 


162 / 569 


6,011,991 


7 


descrambler 39, digital cstimator 41, and finally to ncural 
network analysis or other type of computer 21. Monitored 
finngs of brain nodes may be broken down into digital form 
(c.g. the firing of a node is equivalent to а "1" and nonfiring 
to a “07). These 15 and Os, which are digital, тау be 
modulated onto a carrier and then transmitted to Ше satellite 
so that the monitored brain activity in the signal is m digital 
form. When the computer receives this monitored signal 
from Ше satellite, the demodulating system analvzes thc 
received digital information (c.g. 1s and 05) which is indica- 


tA 


8 


would be stored in memory 57, cach corresponding to a 
particular individual. A normalized curve, waveform, or 
pattern may be developed by repeatedly asking an individual 
tens, hundreds, or thousands of times a particular question or 
group of questions which evoke a known response such as 
“I don't know,” or "no" or “yes.” Each time the response is 
made, a curve, wavelorm, or a palleru is recorded. Alter 
tens, hundreds, or сусп thousands of these patterns have 
been recorded, a normalized curve, waveform or pattern is 
formed based upon same so as to be indicative of that 


tive of the firing of select brain nodes of the monitored > particular individual's attempt to communicate the phrase. 
individual. ‘These digital signals may be transformed, in In a similar manner, if it is desired to store normalized 
certain embodiments, into analog form similar to the illus- curves, waveforms, or patterns for ten different words, 
trations of FIG. 3, or alternatively may be kept in digital phrases or thoughts communicated by a particular 
form and compared with prestored digital signals to deler- |; individual, then a normalized curve, wavelorm, or pattern is 
mine what the monitored person was intending to commu- developed lor each of the different ten items so that ten 
uicale. different normalized curves, wavelorms or райетп are 
In analog embodiments, signal 17 is reccived bv antenna stored in memory 57 for that individual and classified 
19, and the information forwarded to tuner 27, amplifier 43, accordingly. Thus, when computer 21 receives signals indi- 
and the analog information inclusive sign al 45 is lorwarded 2 caling brain aclivily from that monitored individual, the 
to computer 21. In analog embodiments, the signals received received signals are compared by device 55 10 Ше ten 
by Ше monitoring sensors are in the form of waves similar different normalized signals in memory 57 in order to 
to those shown іп FIG. 3 hercin. determine what the individual is attempting to communicate. 
FIG, 2 is а block diagram of computer 21 in certain FIGS. 3(@)-3(f) illustrate different normalized curves 
embodiments of this invention. Ге input thereto may be їп 25 which may be stored in memory 57. PIG. 3(и) shows а 
either analog or digital form. Computer 21 includes proces- normalized curve indicative of individual “Joe” attempting 
sor 51, RAM 53, comparing device 55, and memory 57 lor to communicate the word “по.” FIG. 3(5) shows a normal- 
storing a plurality of files or patterns of measured brain | ized curve indicative of individual "Joc" attempting то 
activity or responses of particular individuals. For example, communicate the word “yes.” FIG. 3(c) shows a normalized 
memorv or storage 57 тау include one file for individual X 5) curve indicative of another individual "Steve" allem pling lo 
which includes hundreds of monitored brain activity (e.g. communicate Ше word “по”, while С. Жа) shows а 
ERPs or ERFs) that were measured when individual X was normalized curve indicative of individual "Steve" attempt- 
attempting to communicate the word “no.” Another file in ing to communicate the word “yes.” Finally, FIG. Ме) shows 
storage or memory 57 may have stored therein hundreds or a normalized curve indicative of still another individual 
thousands of monitored brain patterns or activities of iudi- 35 "Anita" allempting to communicate the word “no”, while 
vidual X when individual X was allempting to communicate VIG. 3(f) illustrates a normalized curve of "Anita" attempt- 
Ше word “yes.” Storage or memory 57 may also include ing to communicate the word “yes.” 
similar files for individual X including patterns which were Thus, if computer 21 receives a signal including moni- 
measured when the individual was attempting to communi- tored brain information identified as being from individual 
cate different words or phrases. Lach of these files may have 40 "Steve", then computer 21 causes the received signal to be 
a normalized curve, waveform or pattern formed or devel- compared Бу device 55 with the normalized curves ог 
oped for cach word, phrase, or thought for cach individual, waveforms shown in FIGS. 3(c) and Xd) and all others 
based upon all of the recorded patterns or curves for that normalized stored signals of “Steve.” Ша match or a close 
word, phrase, or thought (e.g. 1,000 such recordings lor the maich is found between Ше received monitored signal and 
phrase "help me," and 1,000 for the phrase “Сме been 45 the normalized curve of PIG. 3(c), then the computer 
caught." Memory 57 Ішіһег includes іп certain embodi- determines that “Steve” was attempting to communicate Ше 
ments many different files for many different individuals, all word “no.” Meanwhile, if no match is found with the 
including files for cach individual's past communicating of normalized curve of FIG. (с), but a match or a substantial 
particular words, phrases, or thoughts. maich is found with regard to the normalized curve or 
Normalized curves or pallerns corresponding to each so waveform of FIG. Жа), then the computer determines that 
individual's аПетар to communicate a particular word, “Steve™ was attempting to communicate the word “yes.” If 
thought, or a pattern may be stored in storage or memory 57. no match is found between the received “Steve” signal and 
Thus, for individual X attempting to communicate the word any normalized curve or waveform of cither FIG. 3(c) or 
*no", a normalized curve, wavelorm, or a рапет may be FIG. Ха), or with any other normalized curve stored iu 
stored in memory 57 indicative or such a communication. 55 memory 57 corresponding io “Steve”, then the computer 
Likewise, a normalized curve, waveform, or pattern may be determines that it is unclear what “Steve” was attempting to 
stored in memory 57 for individual Y attempting to com- communicate. 
municate the word “no” and another distinct normalized Thus, different embodiments of this invention may be 
curve, waveform, or райетп may be stored in memory 57 Гог utilized 10 help individuals communicate with one another 
individual Y attempting to communicate the word “yes.” In 60 without having to send laxes, make telephone calls, speak, 
а similar manner, a normalized curve, waveform or pattern or the like. For instance, military personnel located in the 
may be stored in memory 37 for individual Y attempting to Middle East or Europe can communicate with superiors in 
communicate the phrase "I don't know" or “Pm not sure.” the Pentagon, simply by use of monitored brain activity 
Thus, if one hundred dillerent human beings have files in being transmitted by satellite to the Pentagon. Alternatively, 
memory 57 corresponding to each of these individual's 65 а special operations individual (e.g. a spy) located in Europe 
attempt to communicate the phrase “I don’t know’, then one could be asked a question by way of a telephone call, fax, or 
hundred different normalized waveforms, curves or patterns the like, and that individual can respond to that question 
150 / 340 


162 / 570 


163 / 569 


6,011,991 


9 


simply by thinking the answer so that that individual's 
monitored brain activity which is transmitted back 10 the 
United States can be analyzed to determine the individual's 
response. In further embodiments of this invention, twoway 
human communication is possible, provided that human 
beings at both locations have equipment capable of analyz- 
ing and monitoring received monitored brain activity. In 
such a manner, individuals at two remote locations may 
communicate with one another without cither individual 
having to speak a word, write anything down, or the like. 


t^ 


10 


brain sensors and/or firing devices to identify which brain 
nodes are responsible lor which types of physical or mental 
behavior, and then the computer transmits firing instructions 
to the firing devices for those nodes to cause them lo be fired 
in a predetermined manner to cffeer such physical or mental 
behavior. 

Once given the above disclosure, many other leatures, 
modifications, and improvemenis will become apparent 10 
the skilled artisan. Such other features, modifications, and 


: р 1) improvements аге, therefore, considered to be а part of this 

In other embodiments, devices mounted to the person invention, the scope of which is to be determined by the 
(e.g. underneath the scalp) may be energized in a predeter- following claims. : 
mined manner or sequence lo remolely cause particular І claim: 
identified brain node(s) то bc fired in order то cause а 1. A method of communicating comprising the steps ol: 
predetermined feeling or reaction in the individual, such as 15 providing a first human being at a first location; 
lack of hunger, lack or depression, lack or thirst, lack of Slee 5 ; d 
aggression, lack оГ alzheimer's disease elects, or the like. 1n providing а computer at Е second location that is remote 
ап example of such an embodiment, the sensors may be from tho first location; 
replaced with remote firing devices. The computer may providing a satellite; 
cause satellite signals to be sent то а receiver on or proximate 20 Providing at least oue sensor оп the first human being; 
an individual, which receiver forwards instructions to the detecting brain activity of the first human being using Ше 
remote firing devices that are mounted, e.g. under the scalp al least one seusor, and transmitting the detected brain 
of the individual, in order to selectively cause same to fire activity to the satellite as a signal including brain 
or be energized. Such energizing of the deviec(s) under or activity information; 
near the scalp in a predetermined manner tend 10 cause 25 the satellite sending a signal including the brain activity 
identified brain nodes to fire a predetermined number of information to the second location; 
times. This is useful, for example, in the following scenarios. a receiver al the second location receiving Ше signal from 
For example, the system can be used to identify which brain the satellite and forwarding the brain activity informa- 
nodc(s) in a particular individual arc typically fired causing, tion in the signal to the computer; 
ша individual to not be hungry. If that individual has ап 50 comparing thc pinum brain activity information o t'ihe 
eating disorder or problems with obesity, then the firing tirer human beins әлін normalized- сг avoraeod brain 
devices сап be remotely enerpized thereby causing the gto a. пре | = . 
identified brain node(s) to be fired at predetermined or аспуйу information relating to the first human being 
random times in order to cause the individual to not be Tom E and š : : 
hungry (even il the individual has not eaten for several hours 55 determining whether the first human being was attempliug 
or several days). to communicate particular words, phrases or thoughts, 

Іп a similar manner, brain nodes which cause an indi- ms upon the үн ши ا‎ brain activity 
vidual to be jovial or not depressed can be identified, and 2 if 2. iP p % Е ai ud : cde heh а 
caused to be remotely fired by the computer and firing Е ле method of claim 1, further including the following 
devices 7 mounted under the scalp in а predetermined 40 Sepe i : А А : 
manner or sequence(s) in order to minimize or prevent asking the first human being a plurality of questions and 
depression of the individual. This may eliminate the need for recording brain activity of the š first human being 
drugs such a Prozac. Alternatively, such drug(s) may be responsive to the plurality of questions in the process ol 
administered after such remote node firings, and the nodes develop me said normalized or averaged PISIS SIDE 
al issue thereafter being monitored as discussed above and 45 information relating to thc first human being stored in 
a biofeedback being perl'ormed to determine the effective- Ше memory. . А : . I 
ness of the drue(s) or alternatively to enable а system to be 5. The method of claim 2, wherein the plurality of 
utilized combining drug treatment with remote node firings questions are (he same q uestram я Р А 
to more ellectively prevent or minimize depression of the 4. те method of claim 2, wherein the plurality ol 
individual. Thus, the biofeedback may enable the identified. 50 questions arc differ cat questions. " | 
nodes to be fired by the firing devices and/or drug treatment 5. Тіс method of claim 2, further nag air the step, of 
at the proper level to most efficiently treat the disease, illness normalizin g or averaging recorded brain aclivily responsive 
or state. This invention, including remote firings and/or lo a given question or sel of questions in developing the 
monitoring, is nol limited to these examples, and ils poten- normalized or averaged brain activity mlormation relating to 
па! uses are almost endless. Brain node firings сап be 55 thc first human being, — : . р 
remotely controlled in a predetermined manner or sequence 6. Amethod of сопуга words Hom a first location 
(s) (even random or sequential) to reduce, minimize, or lo a second location, the method comprising ше steps of: 
eliminate undesirable behavior or mental characteristics. providing a first human being al the first location; 
This may eliminate or reduce the need for burdensome drug providing a compuler al the second location thal is remote 
treatments and the like. Brain node firings of а normal 60 from the first location; 
person, or of a particular person in a given mental or providing at least one sensor on the first human being; 
physical state, may be monitored and the brain activity detecting brain activity of the first human being using the 
stored and analyzed in the computer 21 memory. This stored al least one sensor wherein the brain activity is indica- 
brain activily may then be caused by remotely causing the live of words to be communicated by the first human 
fining devices to cause particular brain node(s) to be fired al 65 being, and [forwarding the detected brain activity 
given times or intervals in a predetermined manner or indicative of words to be communicated to the сош- 
sequence, The computer may be programmed to instruct the puter at the second location; 

151 / 340 


163 / 570 


164 / 569 


6,011,991 


11 


comparing the received brain activity of the first human 
being indicative of words to be communicated with 
normalized or averaged brain activity information 
relating 10 Ше first human being from memory; and 
determining words being communicated by the first 
human being based upon the comparing of the received 
brain activity information to the information from 
memory. 
7. Ге method of claim 6, further including asking the first 
human Беше a plurality of questions and recording brain 
activity of the first human being responsive to the plurality 


tA 


10 


12 


of questions in a process of developing the normalized or 
averaged brain activity information relating to the first 
human being. 

8. The method of claim 6, further comprising the step of 
the computer outputting words determined in said determin- 
ing Мер lo a second human being so that words thought ог 
stated by Ше first human being are communicated by the first 
human being to the second human being via the computer. 


152 / 340 


164 / 570 


PDF SECTION: 


UNITED STATES PATENTS. 


E 


Patent Number: 4,877,027 
Date of Patent: | Oct. 31, 1989. 


FM 
CAPABLE MICROWAVE 
PULSE GENERATOR 
GENERATOR | 


VOLTAGE 
STANDARD 


.httpsilrestricteddocuments.com 101 / 340 


Тһе transmission of intelligible speech by audio mod- 
ulated Microwave is described in the book Microwave 
Auditory Effects and Applications by James C. Lin 
1978 publisher Charles C. Thomas. 


BRIEF SUMMARY OF THE INVENTION 


I have discovered that a pulsed signal on a radio 
frequency carrier of about 1,000 megahertz (1000 MHz) 
is effective in creating intelligible signals inside the head 
of a person if this electromagnetic (EM) energy is pro- 
jected through the air to the head of the person. Intelli- 
gible signals are applied to the carrier by microphone or 
other audio source and I cause the bursts to be fre- 
quency modulated. The bursts are composed of a group 
of pulses. The pulses are carefully selected for peak 
strength and pulse width. Various objects, advantages 
and features of the invention will be apparent in the 
specification and claims. 


114 / 570 


United States Patent па 
Brunkan 


0] Patent Number: 
[45] Date of Patent: 


4,877,027 
Oct. 31, 1989 


[54] HEARING SYSTEM 


[76] Inventor: Wayne B. Brunkan, Р.О. Box 2411, 
Goleta, Calif. 93118 


[21] Appi No.: 202,679 
dun, 6, 1988 


[22] Filed: 


[51] caca AGIN 5/00 
1521 U.S. CL онен 128/420.5 
[58] Field of Search ............... 128/420.5, 804, 419 R, 

128/421, 422, 746; 381/68 


[56] | References Cited 
U.S. PATENT DOCUMENTS 


3,629,521 12/1971 Pubarich et al. ................. 128/402.5 
3,766,331 10/1973 Zink ................................ 128/420.5 


OTHER PUBLICATIONS 


Cain et al, "Mammalian Auditory Responses . . . ", 
IEEE Trans Biomed Eng, pp. 288-293, 1978. 

Frey et al, “Human Perception . .. Energy" Science, 
181,356-358, 1973. 


Jaski, “Кайо Waves & Life", Radio-Electronics, pp. 
45-45, Sep. 1960. 

Microwave Auditory Effects and Applications, Lin, 1978, 
pp. 176-177. 


Primary Examiner—Lee S. Cohen 
Attorney, Agent, or Етт--Наггу W. Brelsford 


[57] ABSTRACT 


Sound is induced in the head of a person by radiating 
the head with microwaves in the range of 100 mega- 
hertz to 10,000 megahertz that are modulated with a 
particular waveform. The waveform consists of fre- 
quency modulated bursts. Each burst is made up of ten 
to twenty uniformly spaced pulses grouped tightly to- 
gether. The burst width is between 500 nanoseconds 
and 100 microseconds. The pulse width is in the range 
of 10 nanoseconds to 1 microsecond. The bursts are 
frequency modulated by the audio input to create the 
sensation of hearing in the person whose head is irradi- 
ated. 


8 Claims, 1 Drawing Sheet 


VOLTAGE 
STANDARD 


FM 


CAPABLE MICROWAVE 21 
PULSE GENERATOR 
GENERATOR | 


154 / 340 


166 / 570 


US. Patent Oct. 31, 1989 4877 027 


ЕМ | 
CAPABLE MICROWAVE 
PULSE 
| GENERATOR | 


GENERATOR 


} 
10 


шы ke RANGE PULSE =) «— 10 NANO SEC 
500 NANO SEC. | 
TO 100 MICRO SEC. TO 1 MICRO SEC. 


167 / 569 155/ 340 167 / 570 


168 / 569 


4,877,027 


1 
HEARING SYSTEM . 


This invention relates to a hearing system for human 
beings in which high frequency electromagnetic energy 
is projected through the air to the head of а human 
being and the electromagnetic energy is modulated to 


create signals that can be discerned by the human being 


regardless of the hearing ability of the person. 


THE PRIOR ART 


Various types of apparatus and modes of application 
have been proposed and tried to inject intelligible 


- sounds into the heads of human beings. Some of these 


have been devised to simulate speech and other sounds 
in deaf persons and other systems have been used to 
inject intelligible signals in persons of good hearing, but 
bypassing the normal human hearing organs. 

U.S. Pat. No. 3,629,521 issued Dec. 21, 1971 describes 
the use of a pair of electrodes applied to a person's head 
to inject speech into the head of a deaf person. An oscil- 
lator creates a carrier in the range of 18 to 36 KHz that 
is amplitude modulated by a microphone. 

Science magazine volume 181, page 356 describes a 
hearing system utilizing a radio frequency carrier of 
1.245 GHz delivered through the air by means of a 
waveguide and horn antenna. The carrier was pulsed at 
the rate of 50 pulses per second. The human test subject 
reported a buzzing sound and the intensity varied with 
the peak power. 

Similar methods of creating “clicks” inside the 
human head are reported in LE.E.E. Transactions of 
Biomedical Engineering, volume BME 25, No. 3, May 
1978. 

The transmission of intelligible speech by audio mod- 
ulated Microwave is described in the book Microwave 
Auditory Effects and Applications by James C. Lin 
1978 publisher Charles C. Thomas. 


BRIEF SUMMARY OF THE INVENTION 


I have discovered that a pulsed signal on a radio 
frequency carrier of about 1,000 megahertz (1000 MHz) 
is effective in creating intelligible signals inside the head 
of a person if this electromagnetic (ЕМ) energy is pro- 
jected through the air to the head of the person. Intelli- 
gible signals are applied to the carrier by microphone or 
other audio source and I cause the bursts to be fre- 
quency modulated. The bursts are composed of a group 
of pulses. The pulses are carefully selected for peak 
strength and pulse width. Various objects, advantages 
and features of the invention will be apparent in the 
specification and claims. 


BRIEF DESCRIPTION OF THE DRAWINGS 


In the drawings forming an integral part of this speci- 
fication: 

FIG. 1is a block diagram of the system of the inven- 
tion. 

FIG. 2 is a diagram of an audio wave which is the 
input to be perceived by the recipient. 

FIG. 3 is a diagram on the same time coordinate as 


FIG. 2 showing bursts that are frequency modulated by 


the wave form of FIG. 2. 

FIG. 4 shows, on ап enlarged time coordinate, that 
each vertical line depicted in FIG. 3 is a burst of puises. 
(А. burst is a group of pulses). 


10 


25 


30 


35 


55 


65 


2 


FIG. 5 shows, on a further enlarged time coordinate, 
a single continues pulse, Depicted as'a vertical line in 
FIG. 4. 


DETAILED DESCRIPTION OF THE 
INVENTION 


Inasmuch as microwaves can damage human tissue, 
any projected energy must be carefully regulated to 
stay within safe limits. The guideline for 1,000 MHz, set 
by the American Standards Institute, is 3.3 mw/cm2 
(3.3 milliwatts per square centimeter). The apparatus 
described herein must be regulated to stay within this 
upper limit. 

Referring to FIG. 1 a microphone 10 or other genera- 
tor of audio frequencies, delivers its output by wire 11 
to an FM capable pulse generator 12 and by branch 
wire 13 to 2 comparator 14. The comparator 14 also 
receives a signal from a voltage standard 16. When the 
peak voltage of the audio generator 10 falls below the 
standard 16 the comparator delivers a signal by wire 17 
to the FM capable pulse generator 12 to shut down the 
pulse generator 12. This avoids spurious signals being 
generated. The output of the FM pulse generator 12 is 
delivered by wire 18 to a microwave generator 19 
which delivers its output to the head of a human being 
23. In this fashion the person 23 is radiated with micro- 
waves that are in short bursts. 

The microwave generator 19 operates at a steady 
frequency presently preferred at 1,000 megahertz (1,000 
million). I presently prefer to pulse the microwave en- 
ergy at pulse widths of 10 nanoseconds to 1 microsec- 
ond. For any one setting of the FM capable generator 
12, this width is fixed. The pulses are arranged in bursts. 
The timing between bursts is controlled by the height of 
the audio envelope above the voltage standard line. In 
addition the bursts are spaced from one another at a 
non-uniform rate of i to 100 KHz. This non-uniform 
spacing of bursts is created in the FM capable generator 
12. 

Referring to FIG. 2 there is illustrated an audio wave 
27 generated by the audio input 10 wherein the horizon- 
tal axis is time and the vertical axis is voltage. For illus- 
trative purposes the wave 27 is shown as having a volt- 
age peak 28 on the left part of FIG. 2 and a voltage peak 
29 of the right side of FIG. 2. The voltage standard 16 
of FIG. 1 generates a dc voltage designated at 31 in 
FIG. 2. This standard voltage is preferabiy at about 
50% of the peak voltage 28. The comparator 14 of FIG. 
1 actuates the FM capable generator 12 only when Ше 
positive envelope of the audio wave 27 exceeds the 
voltage standard. The negative portions of the audio 
wave are not utilized. 

Referring now to FIG. 3 there is illustrated two 
groups of bursis of microwave energy that are delivered 
by the antenna 22 of FIG. 1 to the head of the person 23. 
FIG. 3 has a horizontal time axis identicai to the time 
axis of FIG. 2 and has a vertical axis that in this case 
represents the power of the microwaves from generator 
19. At the left part of FIG. 3 are a plurality of micro- 
wave bursts 32 that occur on the time axis from the 
point of intersection of the standard voltage 31 with the 
positive part of the audio wave 27, designated as the 
time point 33 to time point 34 on FIG. 2. It will be noted 
in FIG. 3 that the bursts 32 are non-uniform in spacing 
and that they are closer together at the time of maxi- 
mum audio voltage 28 and are more spread out toward 
the time points 33 and 34. This is the frequency modula- 
tion effected by the FM pulse generator 12. 


156 / 340 


168 / 570 


169 / 569 


4,877,027 


3 


Referring to the right part of FIG. 3 there are a plu- 
rality of microwave bursts 36 that are fewer in number 
and over a shorter time period than the pulses 32. These 
extend on the time axis of FIG. 2 from point 37 to point 
38. These bursts 36 are also frequency modulated with 
the closest groupings appearing opposite peak 29 of 
FIG. 2 and greater spacing near time points 37 and 38. 

Referring now to FIG. 4 there is illustrated the fact 
that a single burst shown as straight lines 32 or 36 on 
FIG. 3 are made up of ten to twenty separate micro- 
wave pulses. The duration of the burst is between 500 
nanoseconds and 100 microseconds, with an optimum 
of 2 microseconds. The duration of each pulse within 
the burst is 10 nanoseconds to 1 microsecond and a time 
duration of 100 nanoseconds is preferred. The bursts 32 
of FIG. 3 are spaced non-uniformly from each other 
caused by the frequency modulation of 12. FIG. 4 de- 
picts a burst. Each vertical line 40 in FIG. 4 represents 
a single pulse. Each pulse is represented by the envelope 
41 of FIG. 5. The pulses within a burst are spaced uni- 
formly from eachother. The spacing between pulses 
may vary from 5 nanoseconds to 10 microseconds. 

Referring now to FIG. 3, the concentration of bursts 
32 opposite the peak 28 of FIG. 2 сап be expressed as а 
frequency of repetition. I presently prefer to adjust the 
FM capable generator 12 to have a maximum frequency 
of repetition in the range of 25 Khz to 100 Khz. 1 delib- 
erately keep this range low to reduce the amount of 
heating caused by the microwaves. The wider spacing 
of the pulses 32 opposite the cutoff points 33 and 34 of 
FIG. 2 can also be expressed as a frequency of reptition 
and I presently prefer a minimum repetition rate of 1 
KHz. I find that this low repetition rate, altnough in the 
audio range, does not disrupt the transmission of auoio 


5 


30 


4 | 
егей by coaxial cable 21 to the parabolic antenna 22 to 
project microwaves onto the head of a person 23. These 
microwaves penetrate the brain enough so that the 
electrical activity inside of the brain produces the sensa- 
tion of sound. When the parameters are adjusted for the 
particular individual, he perceives intelligible audio, 
entirely independently of his external hearlng organs. 


PRESENTLY PREFERRED QUANTITIES 


As mentioned previously, I prefer rhat the standard 
voltage 31 of FIG. 2 be about 50% of peak audio volt- 
age. This not only helps to reduce heating in the person 
2 but also reduces spurious audio. This 50% is not vitai 
and the useful range is 25% to 85% of peak audio. 

The minimum burst repetition frequency (for exam- 
ple at time points 33 and 34) is preferably 1 KHz and the 
maximum repetition frequency is in the range of 25 KHz 
to 100 KHz, with the lower frequencies resuiting in less 
heating. | 

Тһе time duration of each individual pulse of micro- 
wave radiation is in the range of 10 nanoseconds to 1 
microsecond as indicated in FIG. 5, with the shorter 
time periods resulting in less heating. 


CONTROL OF POWER OUTPUT 


As stated above, I maintain the power output of the 
parabolic antenna 22 within the present safe standard of 
3.3 mw/cm2 (3.3 milliwatts per square centimeter). I 
control the power output by controlling the strengtn of 
the audio modulation. This results in a duty cycle of 
0.005, the decimal measure of the time in any second 
that the transmitter is on full power. The peak power 
level can be between 500 mw and 5 w and at 0.005 duty 
cycle these peaks wiil result in an average power of 2.5 


intelligence to the person 23. The aim, again, is to re- 35 mw and 25 mw respectively. However, these values are 
duce the amount of heat transmitted to the subject 23. further reduced by adjusting the audio modulation so 
that zero input produces a zero output. Since a voice 
OPERATION signal, for exampie, is at maximum amplitude only a 
Referring to FIG. 1, the intelligence to be perceived small fraction of the rime, the average power will be 
by the person 23 is introduced at the audio source 10 40 below the 3.3 mw/cm2 standard, even with 5 watts 
which may be a microphone for voice, or a tape player peak power. 
for music, instruction, etc. This audio signal is transmit- 
ted to the FM capable generator 12 and to the compara- THEORY OF OPERATION 
tor 14. The comparator 14 compares the positive por- I have not been able to experiment to determine how 
tions of the audio wave with voltage from the voltage 45 my microwave system works, but from my interpreta- 
standard 16 and when the audio wave instantaneously tion of prior work done in this field I believe that the 
exceeds the standard voltage, the FM generator is actu- process is as follows. Any group of bursts related to the 
ated by the wire 17 connecting the comparator 14 and audio ek 28 of FIG. 2 causes an increasing ultrasonic 
the FM generator 12. The FM generator 12 then sends build up within the head of a human being starting with 
a plurality of signals to the microwave generator 19 at 50 a low level for the first bursts pulses and building up to 
each peak of the audio wave above the voltage stan- а high level with the last bursts pulses of a group. This 
dard. buildup, I believe, causes the direct discharge of ran- 
This is shown graphically in FIGS. 2-5. The audio | dom brain neurons. These discharges at audio fre- 
signal 27 of FIG. 2 exceeds the standard voltage 31 at quency create a perception of sound. This process, I 
point 33 whereupon the FM generator 12 starts emitting 55 believe, bypasses the normal hearing organs and can 
burst signals 32 at its lowest frequency of about 1 Khz. create sound in a person who is nerve-dead deaf. How- 
As time progresses past point 33 the voltage above the ever, this theory of operation is only my guess and may 
standard кани and the FM generator 12 responds prove to be in error in the future. 
by making the burst signals closer together until at 
28 the maximum density of burst signals 32 is а 60 APPARATUS 
for example at a frequency of 50 Khz. The time duration The apparatus of FIG. 1 for carrying out my inven- 
of each pulse 40 (FIG. 4) is also controlled by a fixed tion may include as a microwave generator Model 
adjustment of the FM generator 12 and for example the РНАОК of Applied Microwave Laboratories and de- 
duration may be 100 nanoseconds. scribed as Signal Source. The cable 21 connecting the 
The frequency modulated burst signals are delivered 65 microwave generator 19 and the antenna is RG8 coaxial 
by FM generator 12 to the microwave generator as cable by Belden Industries. The antenna 22 may be a 
interrupted dc and the microwave generator is turned | standard parabolic antenna. The FM generator 12 has to 
оп in response to each pulse 40 and its output is deliv- бе specially built to include the spacing runction which 
157 / 340 


169 / 570 


170 / 569 


4,877,027 


5 
is obtained by a frequency generator built into a srand- 
ard FM generator. 

I have described my invention witn respect to а pres- 
ently preferred embodiment as required by the patent 
statutes. It will be apparent to those skilled in the tech- 
nology that many variations, modification and additions 
can be made. All such variations, modifications and 
additions that come within the true spirit and scope of 
the invention are included in the claims. 

I сізіш: 

1. Apparatus for creating human hearing comprising: 

(a) an audio source for creating electrical audio 
waves having positive peaks; 

(b) a frequency modulator generator connected to the 
audio source to create frequency modulated bursts; 

(c) a source of constant voltage to create a voltage 
standard that is in the range of 25% to 85% of the 
peak voltage of the audio waves; 

(d) a comparator connected to the voltage source and 
the audio source to compare the instantaneous 
voltage of the waves from the audio source with 
the voltage standard; 

(e) a connection of the comparator to the frequency 
modulator generator to activate the frequency 
modulator generator when the instantaneous volt- 
age of the audio wave exceeds the standard volt- 
age; 

(f) a microwave generator creating microwaves in 
the range of 100 тераһегіг to 10,000 megahertz 
and connected to the frequency modulator genera- 
tor, generating microwaves only when pulsed by 
the frequency modulator generator; and 

(в) ап antenna connected to the microwave generator 
to radiate the head of a human being to producethe 
sounds of the audio source. 

2. Apparatus as set forth in claim 1 wherein the fre- 
quency generating range of the frequency modulator 
generator is 1 Khz to 100 KHz for bursts and 100 KHz 
to 20 MHZ for pulses within a burst. 

3. Apparatus as set forth in claim 1 wherein the fre- 
quency generating range of the frequency modulator 
generator is one Khz to 100 KHz for bursts and 100 


158 / 340 


10 


20 


25 


30 


35 


40 


45 


50 


55 


65 


6 
KHz to 20 MHZ for pulses within a burst and the dura- 
tion of each pulse of the frequency modulator generator 
is in the range of 10 nanoseconds to 1 microsecond. 

4. Apparatus as set forth in claim 1 wherein the volt- 
age standard is approximately 5096 of the peak of the 
audio waves. 

8. Apparatus as set forth in claim 1 wherein the an- 
tenna is of the type that projects the microwaves in 
space to the head of a person. 

6. Apparatus for creating human hearing comprising: 

(a) an oscillator creating an electromagnetic carrier 
wave at a selected frequency in the range of 100 
Mhz to 10,000 Mhz; 

(b) a pulse generator connected to said oscillator to 
pulse the carrier with pulses having a width in the 
range of 10 nanoseconds to | microsecond with а, 
minimum spacing between pulses of about 25 nano- 
seconds; 

(c) а frequency modulator connected to the pulse 
generator; 

(d) an audio signal generator connected to the modu- 
latior which modulates the pulses in accordance 
with the audio signal; and 

(е) a transmitting antenna connected to the oscillator 
to transmit the carrier wave as thus modified to 
project the electromagnetic energy through space 
to the head of a person. 

7. Apparatus as set forth in claim 6 wherein the mod- 

ulator is a frequency modulator to vary the density of 


bursts within an audio. envelope as a function of the 


audio amplitude. 
8. The method of irradiating a person's head to pro- 
duce sound in the head of the person comprising 
(a) irridiating the head of a person with microwaves 
in the range of 100 Mhz to 10,000 Mhz; 
(b) pulsing said microwaves with pulses in the range 
of 10 nanoseconds to 1 microsecond; and 
(c) frequency modulating groups of puises cailed 
bursts by audio waves wherein the modulation 
extends from 1 Khz to 100 Khz. 


а х ж ж ж 


170 / 570 


PDF SECTION: 


UNITED STATES PATENTS. 


E 


172 / 569 


United States Patent 9 


Yanagidaira et al. 


[54] BRAIN WAVE INDUCING SYSTEM 


[75] Inventors: Masatoshi Yanagidaira; Yuichi 
Kimikawa; Takeshi Fukami; Mitsuo 
Yasushi, all of Saitama-ken, Japan 


[73] Assignee: Pioneer Electronic Corporation, 
Tokyo, Japan 

[*] Notice: This patent issued on a continued pros- 

eculiou application filed under 37 CUR 

1.53(d), and is subject to the twenty year 

patent term provisions of 35 U.S.C. 

15Жа)(2). 


[21] Appl. No.: 08/797,655 


[22| Filed: Jan. 31, 1997 
[30] Forcign Application Priority Data 

Feb. 21, 1996 — |IP| Japan Les 8-033848 
[51] Tnt: E uus A61M 21/00 
[52] US; CL aen 600/27; 600/26; 600/28 


[58] Field of Search 000:20-28, 544, 


600/545, 558; 1287731, 732, 745 


US005954629A 


500595462 


5,954,629 


111] Patent Number: 


[4] Date of Patent: *Sep. 21, 1999 
[56] References Cited 
U.S, PATENT DOCUMENTS 
5,241,967 9/1993 Yasushi et al. sss 600727 
5.495.853 3/1996 Yasushi es 600/27 
5,013,498 — 3/1997 Yasushi ctal. sss 600:27 


Primary Examiner—linda C. M. Dvorak 

Assistant kxaminer—Rosiland Kearney 

Attorney, Agent, or Firm—Nikaido, Marmelstein, Murray & 
Oram LLP 


[57] ABSTRACT 


Sensors are provided for detecting brain waves of a user, and 
a band-pass filter is provided lor extracting a particular brain 
waves including ап а wave included in a detected brain 
wave. The band-pass filter comprises a first band-pass filter 
having a narrow pass band, and a second band-pass filter 
having a wide pass band. One of the first and second 
band-pass filiers is selected, and a stimulation signal is 
produced in dependency on an & wave extracted by a 
selected band-pass filter. In accordance with the stimulation 
signal, a stimulation light is emitted to the user in order 10 
induce the user to relax or sleeping stale. 


6 Claims, 12 Drawing Sheets 


REMOTE 
CONTROLLER 


160 / 340 


172 /570 


5,954,629 


Sheet 1 of 12 


Sep. 21, 1999 


U.S. Patent 


002 


SETIORLNOO 


ALONE 


173 / 570 


161 / 340 


173 / 569 


с 
FIG.2 °“ 
= 


Q 
мо 
2E 
А m 
р, 


s Sg 
mmn | EB 


ОШ | | 


|| | {т | il 71 | 
| їн | x ШІ | | | 


Ш | 


5,954,629 


Sheet 3 of 12 


Sep. 21, 1999 


U.S. Patent 


182 


ы“------------------------%----4-- 


55--3 


Pigs 


| 
| 
| 


e SNLLOOW NOLLOZTAS 
омпопаобнани //октаяоояя| 1709100 


175 /570 


163 / 340 


175 / 569 


U.S. Patent Sep. 21, 1999 Sheet 4 of 12 5,954,629 
FIG.4 a 
(C) FREQUENT pod 
Ei ODE REGION - REGION "i 
a WAVE : i 
PRODUCING 
PATTERN 
UN 
RECORED 
Е UPPER 
BRAIN WAVE THRESHOLD 
[8—-13Hz] | j : 13Hz 
(B) Е eec سل‎ 
FREQUENCY | | LOWER 
CHANGE THRESHOLD 
| | 8Hz 
PHASE JUMPING о 
POINT TIME [1sec/ div] 
E2 
El 
APPEARANCE 
RATE (96) ES 
1 El+E2+E3 
<--- س‎ —— 
РА айс 3 


176 / 569 


TIME (MINUTE) 


SLEEP FALLING POINT 


164 / 340 176 / 570 


5,954,629 


Sheet 5 of 12 


Sep. 21, 1999 


U.S. Patent 


ES 


| Гамора]: 
oz LAO] 


5--------................ 


den ANLLNOY NOLLOWTISS 
ا‎ омпопаохани /5NIdWOOsN| YE TIOHLNOD 


Я V| TEZ 92 
E rum 

SNILNOY 
NOLLOXTHS UNV 


О— дд... 


VOOZ 


JA TIOS.LNOO 
SALON 


177 / 570 


165 / 340 


177 / 569 


U.S. Patent Sep. 21, 1999 Sheet 6 of 12 5,954,629 


FIG.6 a 


100 


102 102 
101 


FIG.6 b 


178 / 569 166 / 340 178 / 570 


U.S. Patent Sep. 21, 1999 Sheet 7 of 12 5,954,629 


FIG.7 a 


100 


120 (GND) 103 130 (—) 


140 (+) 140 (4-) 


FIG.7 b 


323 101 
321 322 


179 / 569 167 / 340 179 / 570 


U.S. Patent Sep. 21, 1999 Sheet 8 of 12 5,954,629 


FIG.8 


100A 
120 (GND) 130 (—) 
103 
102 102 
101 
140 (+) 140 (4-) 
1008 
“ 103 130(-) 
102 102 
101 
140 (GND) 140 (+) 


180 / 569 168 / 340 180 / 570 


5,954,629 


Sheet 9 of 12 


Sep. 21, 1999 


U.S. Patent 


E NETIOXLNOO 
a NOLLOWINS акуя 


E 


002 


2М010880) 
ALONAY 


181 / 570 


169 / 340 


181 / 569 


5,954,629 


Sheet 10 of 12 


Sep. 21, 1999 


U.S. Patent 


LL Ola 


ТОМЫ 
Те 


182 / 570 


170 / 340 


182 / 569 


U.S. Patent Sep. 21, 1999 Sheet 11 of 12 5,954,629 


FIG.12 


183 / 569 171 / 340 183 / 570 


5,954,629 


Sheet 12 of 12 


Sep. 21, 1999 


U.S. Patent 


Lav YONG 


СГУ 


184 / 570 


172 / 340 


184 / 569 


185 / 569 


5,954,629 


1 
BRAIN WAVE INDUCING SYSTEM 


BACKGROUND OF THLE INVENTION 


1те present invention relates to a system for inducing a 
brain wave ol the person, and more particularly 10 a system 
for providing a relaxation effect and an activation elect in 
а state of mind of the person. 

In the system, the brain wave of the person is induced by 


tA 


2 


analog signal. The amplifier 30 amplifies the analog signal 
so as to control the light emitted Пот the light emitting 
member 32 of the aciuating шті 30. 

The light signal producing system 20 further comprises a 
microprocessor unit (MPU) 22 having a controller 23. The 
AGC 26 and BPF 27 arc operated by programs of the MPU 
22. А remote controller 21 is provided for applying external 
operating commands to the controller 23. l'he controller 23 
controls tasks and other circuits in the system in accordance 


a feedback control including a brain of the person. Namely, 10 with the operations of the remote controller 21. For example, 
the brain wave ol the person is detected, and a specific the controller 23 produces a message A to initialize the BPF 
element of the brain wave, such as ап с wave is extracted. 27, and controls the amplifier 29 of gain variable Гог 
By using Ше extracted brain wave, 8 signal for controlling adjusting the amount of the stimulation light in accordance 
stimulation by light is produced for inducing a desired brain wih a-choice of ihe ser 
Wave. The stimulating light is applied to the person for 15 In the BPF 27, since the а wave of the brain wave is 
stimulating the brain, thereby inducing Ше desired brain ЗЕН F: N А S I mE 
wave. Uhus, the desired brain wave can Пе powerlully and Hagen to ios p en 5. а пощи band 
quickly induced by an induction effect of the feedback 8 in ove in me b rii € Ж hé ie ame adi 
donus appeared in large amoun is when an aw akening normal à ult 
. . resis, and has а leature thal the dispersion thereof is small 
Such a system is used for as а sole system, ог aS а 20 when the person is relaxed in a clearer awakening state. 
combination system with au audio healing system or a Thus, the BPF 27 has a frequency characteristic of О-10 
massage device. (О=(сепіег frequency Г); (Бапа width Ше gain of which 
НО. 13 shows a conventional brain wave inducing sys- becomes lower than the gain of the center frequency ГБу 3 
tem employed with a feedback loop structure including a di3)). The a wave has a waveform having an amplitude 
brain of a user. The system comprises a sensor unit 10 for 25 between 10 to 100 НУ and frequency between 8 to 14 Hz. 
detecting a brain wave of the user, a light signal producing However, there is an individual difference in о. wave char- 
system 20 for extracting a specific element of the brain wave acteristics. ‘Thus, the center Гтециепсу of the ІРІ: 27 is set 
and producing a light stimulation signal, and an actuating to be varied for covering the range of the [requency. 
unit 30 for applying the stimulating light based on the light — l'urthermore, in the BPI 27, since a proper o wave is 
stimulation signal to the user. 20 determined іп dependeney on the person, influence caused 
The sensor unit 10 comprises a headband 11 to be casily by the individual difference is controlled to be absorbed. If 
put on or removed from a head of the user, and an ear clip a person having a high frequency of à wave is induced to a 
14a detachably clipped оп an ear of the user. A pair of range of a low Ітедиепсу of о. wave, the person may [ее] bad 
electrodes 12 and 13 as brain wave sensors arc provided on _ because of a large difference between the frequencies. In 
an inner portion of the headband 11 so that the electrodes are 35 order to solve the problem, at initialization, the BPF 27 
touched on a forchead of the user when the headband П is operates to change the center frequency step by step to 
put on the head. The ear chp 144 has an electrode 14 as а sweep the band of the a wave. Then, ап average lrequency 
brain wave sensor to be touched on the ear. of the bram wave signal is calculated to set the center 
‘The actuating unit 30 comprises a capsule or cover 31 lo б frequ сосу to a value lower than the average valuc by 0.5 Hz. 
cover the head and face of the user, and a light emitting Thereafter, the center frequeney is fixed to the өсі value 
member 32 provided on an inner portion of the the cover 31 during the procedure. Thus, an inconvenience such as a bad 
al a position such that the stimulation light is applied to eves feeling is avoided. 
of the user. Describing the operation of the system, the brain wave of 
‘The light signal producing system 20 is provided [or ¿s the user is detected by the sensor unit 10. The detected brain 
extracting the specific clement of the brain wave and pro- wave is amplified by the amplifier 24. The amplificd brain 
ducing a light stimulation signal for controlling stimulation wave is applied through the A/D converter 25 and the AGC 
by light based on the extracted brain wave, thereby inducing 26 to the BPI 27 where a proper a wave is extracted. "The 
the desired brain wave. The system comprises a biological extracted brain wave is applied to the amplifier 29 through 
amplifier 24 to which outputs of the electrodes 12, 13 and 14 « the DA converter 28. The amplifier 29 produces an electric 
of the sensor unit 10 arc connected, ап АЛ) converter 25, an signal for light stimulation based on Ше extracted brain 
automatic ваш control circuit (AGC) 26, a band-pass filter wave. The light stimulating signal is applied to the actuating 
(18017) 27, a DA converter 28, and ап amplifier 29 connected unit 30. lhe light emitting member 32 emils the light for 
to the light emitting member 32 of the actuating unit 30. stimulation which is applied lo the closed eyes of the user, 
The electrodes 12 of the sensor unit 10 is connected to a 55 thereby stimulating the brain. : | N 
GND input of the amplifier 24, the electrode 13 is connected Thus, the user is sufficiently applicd with a proper light 
to a minus input, and the electrode 14 is connected to a plus stimulation produ ced bascd on own c wave to be induced to 
input, respectively. The amplifier 24 amplifies a very weak a relaxed state in a short time. 
brain wave signal detected by the sensor unit 10 10 a As hereinbefore described, a main purpose of the con- 
predetermined value. ‘The amplified brain wave signal is 60 ventional brain wave inducing system is to Induce the person 
applied to the A/D converter 25 for converting the signal шо to а relaxed condition. 
а digital signal of 8 bits, for example. The digital brain wave However, if the system is provided with not only the 
signal is applied to the AGC 26 in which the gain of the relaxation effect but also a sleep inducing elTect Гог posi- 
signal is adjusted l'or a following stage. The BPI 27 operates tively inducing the person to sleep, the product worth of the 
lo extract a predetermined element of the band of the brain 65 system may be increased. In Ше improvement, 
wave signal. The D/A converter 28 converts the extracted economically, it is necessary to lower developing and manu- 
band clement of the brain wave of the digital signal into an facturing costs as less as possible. 
173 / 340 


185 / 570 


186 / 569 


5,954,629 


3 


In order to realize the brain wave inducing system pro- 
vided with Ше sleep inducing electi in addition іс Ше 
relaxation elect by using the basic composition of the 
conventional system with small change, technical means 
must be designed for the system. 

l'urtbermore, in the conventional system, one of the brain 
wave sensors is mounted ou the bead of the user lor 
detecting the brain wave. However, the condition that the 
sensor is directly mounted on a part of the body may cause 
the user to be nervous. In such a case, a sufficient sleep 


FIG. 2 is a diagram showing a frequency characteristic of 
the brain wave when a person drops olT to sleep; 


116. 3 is a diagram showing a second embodiment of the 
brain wave inducing system of the present invention; 

110$. 4а and 45 are diagrams showing characteristics of 
the brain wave when the person sleeps; 

FIG. 5 is a diagram showing a third embodiment of the 
present invention; 

FIGS. ба to бс arc schematic diagrams showing ап сус 


inducing effect сап not be obtained. П the system is used ші mask; 
during sleepi пе, the system may interfere natural moving 110$. Та and 75 are schematic diagrams showing the eve 
such as turning in sleep. p е 

при D 5 mask; 

Therefore, it is preferable that the system can be used кер 2 Е 28522 " 
without mounting sensors on the body. | ПО. 8 is a plan view showing a modification of Ше eye 

| dw | : 15 mask; 

l'urthermore, the ear clip is used as the other brain sensor . . . _ , | 
because the ear is near ihe brain, and has no muscles. FIG. 9 is a plan view showing another modification of the 
Consequently, noises to be caused by action of the muscle do | СУС Mask; 
not producc. In addition, the electrode can bc casily attached FIG. 10 is a diagram showing a fourth embodiment of the 
10 Ше ear by the ear clip. jy Present invention; 

However, the ear clip stimulates the ear compared with L1G. 11 is a diagram showing а filth embodiment of the 
the headband, and may hurt the ear if it is used for а long present invention; 
timc. FIG. 12 is a schematic diagram partly showing a modi- 

Therefore, it is desirable that even if the user must mount fication of the first embodiment; and 
Ше seusor оп Ше body, Ше relaxation and sleep iuducing 25 BIG. 13 is a diagram showing a conventional brain wave 
elects, or al least Ше relaxation ellect can be easily inducing system. 
obtained. 

SUMMARY Ol: THE INVENTION DETAILED DESCRIFTION OF THE 
: А P я : PREFERRED EMBODIMENTS 

^n object of the present invention 15 lo provide a brain 30 (l'irst embodiment) 
wave induciug system which may have relaxation inducing L1G. 1 shows a brain wave inducing system of the present 
effect and sleep inducing effect. invention applied to a mind refresh system. 

Another object of the present invention is to provide a It is known that when the person closes the eyes, the brain 
system with which relaxation ellect and sleep inducing wave produces the e wave, and when the person drops off 
ellect are easily obtained. 35 lo sleep, Ше « wave changes 10 a 73 wave а Педиепсу of 

According to the present invention, there is provided а which is lower than Ше с. wave. FIG. 2 shows frequency 
brain wave inducing system comprising sensors for detect- characteristics of the brain wave until the person falls into 
ing brain waves of a uscr, a band-pass filter for extracting a sleep. It will be scen that there are states where the person 
particular brain waves including an « wave included in a closes сусѕ and rests for З minutes, and falls into slecp 
detected brain wave, the band-pass filter comprising a first 40 through а sleep transient period Гог 7 minutes. The stale of 
band-pass filter having a narrow pass band, and a second mind of the person changes from a relaxation stale in the 
band-pass filter having a wide pass band, first sclecting closed-cyes rest period, а special doze state where a flash of 
means for selecting one of the first and second band-pass an idea or an imape may be casily produced, and to a sleep 
fillers, output means lor producing a stimulation signal state. The с wave has a small dispersion in the closed-cye 
dependent on ап a wave extracted by a selected band-pass 45 rest period, and is repealedly disappeared and reappeared 
filter, and light emitting means responsive to the stimulation with Ductuation in the sleep transient period, and changes to 
signal for emitting a stimulation light to the user. the ¢ wave in the slecp period. The attention of the person 

А memory is provided for recording the extracted brain is gradually reduced to reduce the awakening level. 
waves and lor reproducing the recorded brain waves, and Referring back to 116. 1, in the brain wave inducing 
second selecting means for selecting either of the recording 50 system, structures which are the same as those of Ше 
or reproducing of the brain waves. conventional system of LIG. 13 are identified with the same 

The sensors arc mounted on an сус mask to be attached reference numerals as FIG. 13, and descriptions thereof are 
тоа forchcad of the user. omitted. 

The detecting means is provided for detecting a sleep A lighi signal producing syslem 200 has a BPL unit 270 
falling point when the user Talls into sleep. The detecting 55 comprising a first РІ: 2704 апа a second BPI’ 2705, and 
means detecis the sleep falling point by detecting a time switches 51 and S2 for selectively connecting the first BPF 
when а wave appearance rate reduces 50% from a reference 270a and the second BPF 270b to the AGC 26 and the D/A 
value. converter 28. The first BPF 270а has (О-10 with a narrow 

These and other objects and features of the present pass band corresponding lo the a wave in the eye-closed тезі 
invention will become more apparent from the following 50 state. The second ІРІ: 270 has Q=5 with a wide pass band 
detailed description with reference to the accompanying | Corresponding to support frequency ranges of fluctuation of 
drawings. the а wave in the ісер transient state. The center frequency 

рада | На and the Q of each of the first and second BPI’s are provided 
BRILE DESCRIPTION Ol DRAWINGS to be changeable. 

МО. Í is а diagram showing a mind-refresh system io 65 A controller 230 of the MPU 22 has a band selection 
which a brain wave inducing system according to the present routinc 231 having a normal mode and a sleep induction 
invention is applied; mode. One of the modes is selected by operating a remote 

174 / 340 


186 / 570 


187 / 569 


5,954,629 


5 


controller 121, and the band selection routine 231 produces 
a flag B which is applied to the BPI" unit 270 Гог selectively 
operating the switches S1 and 52 to close contacts for the 
first BPF 270a or the second BPF 2705. Thus, the с wave 
is extracted. from a proper BPF in accordance with the 
selected mode. 

In operation, the brain wave of Ше user is detected by the 
sensor unit 10. The detected brain wave is amplified by the 
amplificr 24. The amplified brain wave is applied through 
the АЙ? converter 25 and the AGC 26 to Ше BPL 270 where 


tA 


6 
in Ше memory 281, and a reproducing mode for reproducing 
the data stored in the memory 281. Lach mode is selected by 
operating (he remote coniroller 121, and Ше recording? 
reproducing sclection routine 232 produces control signals C 
and D which are applied to the switching circuits S3 and S4, 
respectively. 

When the recording mode is selected, the control signal С 
operates the switching circuit S3 to close it. The control 
signal D operates the switching circuit S4 to connect Ше 
BPF unit 270 to the D/A converter 28. Thus, the extracted 


a proper о. wave is extracted. Namely, when the normal 1 brain wave of the BPI unit 270 is applied to the memory 281 
mode is selected by the remote controller 121, the flag B of and stored therein, and to the D/A converter 28. 
the normal mode is applied to the switches 51 and 52 of the On the other hand, when Ше reproducing mode is 
BPU unit 270 which are operated to close the first BPI’ 270a. selected, the control signal С operates the switching circuit 
Thus, the output signal of tbe AGC 26 is applied 1o the first S3 lo open il. The control signal D operates the switching 
BPF 270a through the switch S1. The first BPF 270a 15 circuit S4 to connect thc memory 281 to Ше D/A converter 
extracts Ше œ wave in the cye-closcd rest state which is 28. Thus, the brain wave data stored in the memory 281 is 
applied to the DA converter 28 through the switch $2. Thus, reproduced and applied to Ше D/A converter 28. 
a slimulation signal having a [Tequency corresponding to the The sleep falling point detecting circuit 250 is provided 
extracted & wave is produced. The stimulation signal is for detecting а sleep falling point in accordance with the a 
applied to the light emitting member 32 through the ampli- 20 wave. The sleep falling point detecting circuit 250 is applicd 
fier 29. The light emitting member 32 llickers al Ше fre- with the brain wave signal from the amplifier 24 and detects 
quency of the simulation signal. ‘Thus, the а wave in the that the amount of the c wave included in Ше brain wave 
eye-clased rest state is applicd by the feedback control, reduces compared with the amount of the о. wave in the 
thereby obtaining the relaxation «Несі, closed-eye rest state. Thus, the slecp falling point іп which 
When the sleep induction mode is selected, the Нар B of 25 the person falls into sleep through the sleep trasient period 
the sleep induction mode is applied 10 the switches S1 and is detected. lhe detected signal is applied to the controller 
$2 which are operated to close the second BPI’ 2705. Thus, 230A of the MPU 22. р . КРЕ . 
the output signal of the AGC 26 is applied to the second BPF я The Men. E aron of the жк ae point detect- 
270b through thc switch 51. The second BPF 2706 extracts | TE ОТОН т. will pe 2 UE аи, e Я 
Ше о. wave in the sleep transient state which is applied to the 5o ance rale ot the PE I RV M "n ешше N D (accumu bn „ште 
р s vy d Q. š | of a frequent region of the © wave/l minute)x100%. А 
D^ ET Е through ihe уеп 52. Тї», even u шев reference value of the с. wave appearance rate is obtained 
Wave 15 fluctuated m the sleep transient stale, approximately based оп an average of Ше a wave appearance rale from a 
all of the OWAYE 18 applied by the feedback control, thereby slari point. When the o wave appearance rate is less than 
obtaining the slecp inducing effect. р 50% of the reference valuc, it is determined that the point at 
l'rom the l'oregoing, Ше leedback control is repeated so 35 that time is the sleep falling point. In an example shown in 
that the induction operation of brain wave lor increasing the VIG. 45, when 4 minutes have passed, the sleep falling point 
sleep inducing elect is provided in addition 10 the induction is detected. In order to prevent erroneous detection caused 
operation for increasing the relaxation effect. A desired by noises made by opening and closing сусѕ, and muscles, 
effect can be automatically obtained by selecting a desired the averaging process is used. 
mode in dependency on a body condition of the user. 40 [n order to obtain the lrequent region of the o wave, the 
(Second embodiment) Irequencv of the detected brain wave is calculated as shown 
Referring to FIG. 3 showing а second embodiment of the in FIG. да. When the frequency is deflected from the range 
present invention, the system is provided with a recording’ between 8 and 13 Hz, a jumping point of phase is deter- 
reproducing function for a proper retracted brain wave when mined, When a period of the phase jumping point execeds 1 
the person drops off to sleep. In a light signal producing 45 second, that period is determined as the frequent producing 
system 200A, a controller 230A of the MPU 22 further has region of the с. wave. An instantaneous frequency of the 
а recording ‘reprocicing selection routine 232. Furthermore, detected brain wave is obtained by а known complexed 
a sleep falling point detecting circuit 250 and a recording’ Demodulation (CD) method. 
reproducing changeover circuil 280 are provided. As a result of experiments based on a sincipital brain 
Other parts are Ше same as those of the first embodiment 50 wave, Ше sleep falling point was detected at high 
of LG. 1 and identified with the same reference numerals as probability, more than 80%. 
FIG. 1. When the controller 230A of thc MPU 22 is applied with 
The recording/reproducing changcover circuit 280 com- the «ісер falling point signal from the «ісер falling point 
prises a memory 281 such as a ring buller provided between detecting circuit. 250, Ше recordingireproducing selection 
the BPI unit 270 and the DA converter 28 for storing Ше 55 routine 232 operates the control signal C to open Ше 
brain wave extracted by the BPF unit 270, and for applying switching circuit S3. Thus, the data recording of the BPF 
the stored data of the brain wave to the D/A converter 28. unit 270 in the memory 281 is stopped, and the stored 
The memory 281 has a storage capacity for storing data of content is fixed corresponding to the sleep falling point 
the extracted brain wave for the BPU unit 270 Гог a few detection. 
minules. 60 Describing the operation of the system, when the user 
The recording ‘reproducing changeover circuit 280 further selects the recording mode, the brain wave signal of the BPF 
has an input switching circuit $3 for connecting the BPF unit unit 270 is applicd to Ше РА converter 28 through the 
270 lo the memory 281, and an output switching circuit 54 switching circuit S4. hus, the relaxation еПес and the sleep 
for selectively connecting the BPI unit 270 and the memory inducing elleci are selectively obtained. 
281 to the DA converter 28. 65 At the same time, the brain wave signal of the BPU unit 
The recording ‘reproducing selection routine 232 has a 270 is applicd to the memory 281 through the switching 
recording, mode for recording the output of the BPF unit 270 circuit S3 and storcd thercin. 
175 / 340 


187 / 570 


188 / 569 


5,954,629 


7 


When the user falls into ісер, and the sleep falling point 
detecting circuit 250 detects Ше sleep falling point, the 
switching circuit S3 is operated to be opened. ‘Thus, the 
content of the memory 281 is fixed at the time. The brain 
wave signal before Ше Ясер falling point is maintained 
within an allowable range of the storage capacity of the 
memory. 

AL the subsequent utilization of the system, if the repro- 
ducing, mode is selected by the user, the brain wave data 


tA 


8 

emitting member 320 comprises a base portion 321 and 
LEDs 322 adhered lo Ше base portion 321. А piece of 
nonwoven fabric 323 is covered оп the base portion 321 as 
a cushion member for avoiding a foreign object feeling. The 
beams of light emitted from the LEDs 322 of the light 
emitting members 320 pass through the nonwoven fabric 
pieces 323 so as lo become scattered light and applied to the 
corresponding eyes of the user lor visual stimulation. 

Thus, the сус mask device 100 integral with the brain 


stored in the memory 281 is reproduced and applied to Ше 10 wave sensor and the light emitting clement is formed. 

D/A converter 28. In the reproducing, mode, since the light FIG. 8 shows a modification of the сус mask device, In an 
signal is produced in accordance with the content of the eye mask device 100A, one end of each ear sirap 102 is 
memory, il is not necessary lo use the sensor шті 10. The connected lo a side of the [forehead portion 103. Thus, even 
inducing effect is sufficiently obtained without the brain if the rcinforcement member 104 is omitted, the electrodes 
wave sensor. 15 120 and 130 can be stably abutted on the forchead by the 

In the reproducing mode, the amplification factor is tensile strength of the rubber straps. 
gradually reduced to Гаде out the light stimulation because ПО. 9 shows another modification. of the eye mask 
the light stimulation. disturbs the sleep of the user. Thus, device. In an eye mask device 10013, the electrode 120 is 
luminance is reduced. omitted, and onc of the electrodes 140 is connected to the 

It is effective to change luminance in dependency on the 20 GND input of the amplifier 24 in place of the electrode 120. 
appearance of the « wave and Ше result of the sleep Гапу By such an arrangement, il is possible to detect the brain 
point detection, and to changeover the output of the BPU unit wave. 

270. (Other embodiments) 
(Third embodiment) FIG. 10 shows a fourth embodiment of the present inven- 

Referring to FIG. $ showing a third embodiment of the 25 tion where the сус mask device is employed for the brain 
present invention, the system has a face mounted device 100 wave inducing system of the first embodiment. 
in ше form of an eye mask in place of the sensor unit and 116. 11 shows a filth embodiment of the present invention 
the actuating unit of the previous embodiments, and the light where the сус mask device is employed for the conventional 
signal producing system 200A which is the same as the system shown in FIG. 13. 
second embodiment of LEG. 3. 30 FIG. 12 shows a modification of the light signal producing 

Relernng to VIG. ба, the eye mask device 100 has а system where a BPI unit 270A is provided on a preceding 
bandage 101 for shielding the eyes of the user and a pair of stage of the AGC 26 other than the BPI unit 270 as a 
car straps 102 made of rubber secured to the both sides of the following stage. 
bandage 101. The characteristics of filters of both BPF units are entirely 

As shown in ПО. 65, а lug is sewed on an upper portion 35 or approximately the same. Namely, each of the preceding 
of the bandage 101 to form а forehead portion 103 which is and following ВРО units 270A and 270 has the first BPU 
abutted on a forehead of the user when the eye mask device 2704 having the narrow band and the second BPI’ 2705 
100 is put on the face. In the forchead portion 103, а having the wide band. The pass band of the first BPF of the 
reinforcement member 104 of a resilient plate is embedded preceding BPF unit is equal to that of the following BPF 
so as lo be curved along the forehead. Thus, when the eye 40 unit. Similarly, the pass bands of the second 13015 of the 
mask device 100 is pul on the face of the user as shown in preceding and following BPU units are equal to each other. 
FIG. 6c, the forehead portion 103 is securely abutted on Ше In operation, the band of the brain wave is limited by the 
forchead. preceding BPF unit 270A. The eain of the limited signal is 

Referring to FIG. 7a, a pair of electrodes 120 and 130 arc controlled by the AGC 26. The following BPF unit 270 
provided on au inner side of the forehead portion 103 in а 45 operates to remove a distortion in the signal caused by the 
lateral direction. А pair of electrodes 140 are provided оп gain control. 
opposite lower portions of the bandage 101 at positions The structure of thc system is applicable to Ше previous 
corresponding to the checks of the facc. embodiments shown in FIGS. 1, 3, 5 and 10. 

Lach of these electrodes is lormed by, Гог example a In order to precisely control the AGC 26 and the BPI 
copper Toil adhered to the forehead portion 103 and the 50 units 270A and 270 at a high speed, DSP and a circuit are 
bandage 101. Г the copper loil directly touches the face, the employed. 
user may feel unpleasant. In order to avoid the unpleasant In accordance with the present invention, the band for 
fecling, a picce of conductive fiber is adhered on cach extracting the brain wave is sclected by one of the wide and 
electrode by a conductive adhesive. As the conductive liber, narrow bands. Consequently, il is effective to obtain the 
span polyester fiber with nickel coating is employed. 55 sleep inducing effect in addition to the relaxation effect. 

The electrodes 120 is connected to the GND input of the The brain wave is stored in the memory in order to 
amplifier 24, namely to the ground through a lead (not reproduce the frequency fluctuation in the sleep transient 
shown), the electrode. 130 is connected to the minus input, period. Thus, it is possible to induce the slecp transient state 
namely the inverted input thereol, and each of the electrodes by drawing the brain wave without using the brain wave 
140 is connected 10 the plus input, namely the non-inveried 60 sensor. Since the troublesome caused by the sensor is 
input thereof, respectively. avoided, the relaxation effect and sleep inducing cffcet are 

Since the distance between the plus and minus electrodes further improved. 
is largely set to increase the difference between the input Since the the brain wave sensor and the light emitting 
signals, the S/N ratio is improved. elementis are integrally [formed in the eve mask device 

As shown іп FIG. 75, a pair ol light emitting members 320 65 without. the ear clip, Ше relaxation effect can һе easily 
are provided on the inner side of the bandage 101 at obtained. Furthermore, the relaxation and sleep inducing 
positions corresponding to the eyes of the user. Each light effects arc improved. 

176 / 340 


188 / 570 


189 / 569 


5,954,629 


9 


While the invention has been described in conjunction 
with preferred specific embodiment thereof, И will be under- 
stood that this description is intended to illustrate and not 
limit the scope of the invention, which is defined by the 
following claims. 

What is claimed is: 

1. А brain wave inducing system comprising: 

sensors for detecting brain waves of a user; 

a band-pass filter lor extracting particular brain waves 


10 


light emitting means responsive to the stimulation signal 

for emitting a stimulation light to the user. 

2. The system according to claim 1 further comprising a 
memory lor recording the extracted brain waves and for 
Teproducing the recorded brain waves, and second selecting 
means Гог selecting either of the recording or reproducing of 
the brain waves. 


3. ‘The system according to claim 1 wherein the sensors 


including an «x wave included in a detected brain wave, 12 are mounted on ап сус mask to be attached to a forehead of 
the band-pass filler comprising a first band-pass filler the user. 

having a narrow pass band, and a second band-pass 4. The system according to claim 2 further comprising 

filter having a wide pass band connected in parallel to detecting means for detecting a sleep falling point when the 

said first band-pass filter; 15 User falls into sleep and producing a signal, the sccond 
first selecting means for selecting one of the first and selecting means being provided to select the recording of the 

second band-pass fillers, wherein said first band pass brain waves [rom the starting of the extraction of the brain 

filter corresponds to an а wave іп ап cyc-closed rest yayes lo until receiving the signal of the sleep falling point. 

state of the user and has a narrow pass filter corre- . ; > ; ; 

sponding to the a wave іп ап eye-closed rest state of the 2 5. The system accordiug [0 claim 4 wherein the delecting 

user, and wherein said second band pass filler corre- means detects the sleep falling point by detecting a time 

sponds lo ап « wave in a sleep transient state of the user when ct wave appearance rate reduces 50% from a reference 

and has a wide pass filter corresponding to an e. wave value. 

in the slecp transient state of the user; 6. The system according to claim З wherein the eye mask 
output means for producing a stimulation signal depen- 2s has а resilient member so as to be curved along the forehead. 

dent on ап « wave extracted by a selected band-pass 

filler; and ов ожо od 

177 / 340 


189 / 570 


PDF SECTION: 


UNITED STATES PATENTS. 


E 


191 / 569 


United States Patent 9 


Norris 
[54] ACOUSTIC HETERODYNE DEVICE AND 
METHOD 
[75] Inventor: Elwood С. Norris, Poway, Calif. 
[73] Assignee: American Technology Corporation, 
Poway, Calif. 
[21] Appl. No.: 684,311 
[22] Led: Jul. 17, 1996 
[51]. I CIS aout H04B 3/00 
1521 95. С saq aa gaan trece 381/77; 381:79 
[58] Field of Search... 381/79, 77, 82 
[56] References Cited 
U.S. PATENT DOCUMENTS 

1,016,039 2/1927 Sprague . 

1,951,669 3/1934 Ramsey. 

2,461,344 271949 Olson. 

3,012,222 12/1961 Hagemann . 

3,398810 8/1968 Clark, IIT. 

3.612211 10/1971 Clark, ПТ. 

3,613,069 10/1971 Cary ct al. . 

3,641,421 2/1972 Stover . 

3,710,332 1/1973 Tischner el al. . 

3,723,957 3/1973 Damon. 

3,742,433 6/1973. Kay ct al. . 

3,836,951 9/1974 Geren el al. . 

4.207,571 6/1980 Passey. 

4,245,136 171981 Kraucl, М. 

4,378,596 3/1983 Clark. 

4,418,404 11/1983 Gordon el al. . 

4,593,160 6/1986 Nakamura . 

4,823,908 4/1989 ТаваКа ct al. . 

4,991,148 — 2/199] Gilchrist . 

5,317,543 5,994 Grosch. 


0500 


5889870A 
11] Patent Number: 5,889,870 
[4] Date of Patent: Mar. 30, 1999 


3,337,378 10/1994 ‘Tanishi . 
OTHER PUBLICATIONS 


Ultrasonic Ranging System—Polaroid. 

Helmholtz (Excerpts from On Combinaton Toncs)—Edi- 
tor's Comments on Paper 16. 

Aoki, K., et al., “Parametric 1 .oudspeaker—Charaleristics of 
Acoustic пей and Suitable Modulation of Carrier Ultra- 
sound,” Electronics and Conununications in Japan, Part 3, 
vol. 74, No. 9, pp. 76-82 (1991). 

Makarov, S.N., et al., “Parametric Acoustic Nondirectional 
Radiator," Acustica, vol. 77, pp. 240—242 (1992). 
Westervell, P.L, “Parametric Acoustic Array," fhe Journal 
of the Acoustic Society of America, vol. 35, No. 4, pp. 
535-537 (1963). 


Primary Examiner—]l'orester W. Isen 


Attorney, Agent, or Firm—Thorpe, North & Western, LLP 
[57] ABSTRACT 


The present invention is the emission of new sonic or 
subsonic compression waves Попа a region resonant cavily 
or similar of interference of at least Iwo ultrasonic wave 
trains. In onc embodiment, two ultrasonic emitters are 
oriented toward the cavity so as to cause interference 
between emitted ultrasonic wave trains. When Ше dillerence 
in frequency between the lwo ulirasonic wave trains is in the 
sonic or subsonic frequency range, à new sonic or subsonic 
wave train of that frequency is emitted from within the 
cavity or region of interference in accordance with the 
principles of acoustical heterodyning. lhe preferred 
embodiment is a system comprised of a single ultrasonic 
radiating clement oriented toward the cavity emitting mul- 
tiple waves. 


6 Claims, 7 Drawing Sheets 


179 / 340 


191 / 570 


U.S. Patent Mar. 30, 1999 Sheet 1 of 7 5,889,870 


12 10 


Fig. 1 


Fig. 2 


192 / 569 180 / 340 192 / 570 


U.S. Patent Mar. 30, 1999 Sheet 2 of 7 5,889,870 


_— а 9 а 
pd 


Fig. 4 


193 / 569 181 / 340 193 /570 


U.S. Patent Mar. 30, 1999 Sheet 3 of 7 5,889,870 


Fig. 5A 


Š 
Ë 
р) 
š 
= 
< 
Š 
uy 
с 
D 
Ш 
9. 
m 
О 
б 
m 
° 
= 
Š 
> 
е 


359404 9S9NIHOLSZUH 


194 / 569 182 / 340 194 / 570 


U.S. Patent Mar. 30, 1999 Sheet 4 of 7 5,889,870 


100000 


10000 


m 
ёз 5 
ц. 
g 
8 
s 8 888888 8° 8 


# 000;/8p 


195 / 569 183 / 340 195 / 570 


U.S. Patent Mar. 30, 1999 Sheet 5 of 7 5,889,870 


Fig. 6B 


—— 


zm 
SR T 

a, 
Fig. 8 


196 / 569 184 / 340 196 / 570 


U.S. Patent Mar. 30, 1999 Sheet 6 of 7 5,889,870 


pp СО 


197 / 569 185 / 340 197 / 570 


5,889,870 


U.S. Patent Mar. 30, 1999 Sheet 7 of 7 
92 
90 
Fig. 11 
102 
20 72 с 
J 
)))2))))))) 
30 a 
104 
Fig. 12 

EN 

“ы 

ER 

9 
ы ))))))) Ж 
96 

20 
Fig. 13 
186 / 340 198 / 570 


198 / 569 


199 / 569 


5,889,870 


1 
ACOUSTIC HETERODYNE DEVICE AND 
METHOD 


BACKGROUND OF THE INVENTION 


1. Field of the Invention 

This invention pertains to compression wave generation. 
Specifically, Ше present invention relates to a device and 
method Гог indirectly generating a new sonic or subsonic 
compression wave withoul the use of a direct radiating 


tA 


2 


output into the same instrument or acoustic resonator. It is 
apparent that such a solution is totally impractical. 

In Ше real world, the challenge of reproducing sound has 
been allocated to the speaker. ‘The operation of a loudspeaker 
is relatively simple to understand when the interaction of the 
components is explained. А speaker is а transducer which 
receives energy in one form (electrical signals representative 
of sound) and translates the energy to another form 
(mechanical vibration). In a dynamic loudspeaker, an elec- 


element al the source of the new compression wave genera- 1 trical current that is proportional to the strength and fre- 
tion. quency of the signal to be broadcast is scat through a coil 
2. State of the Art attached to а rigid membrane or cone. The coil moves inside 
Sound waves in general аге wave-like movements of air a permanent magnel, and the magnetic field exerts a lorce on 
or water molecules. Because these media are elastic and ,. the coil thal is proportional to the electrical current. ‘The 
Е ае, бинте ‚у: 15 oscillating movement of the сой and the attached membrane 
generally homogeneous, naturally occurring sound travels in io я à à ms 
all directions radially from the source of gencration. А voice, Sets Up SOU nd waves in tho sur tounding air. In brief, pee 
instrument or impact, for example, will radiate omni- duction of sound has heretofore required mechanical move- 
directionally in a unitary, integrated form, carrying multiple ment of a diaphragm or plate. lo expecl a single diaphragm 
frequencies, overtones, and a full range of dynamics that. 4, = plate to accurately supply both tig ие пиеш, 
collectively contribute 10 an instantaneous sound perception и piccolo and the decp resonance of the base drum would 
at the car. This perception of naturally occurring sound at a indeed be unreasonable. | 
healthy саг is deemed to be “pure” when it corresponds to It is important to note, however, that when the listener at 
the same acoustic content that existed at the point of origin. a live performance Е Га symphony hears this broad range ШІ 
Because sound is а transient, temporary stale of motion 24 sound, he Tecelven win ап integrated тапет ча a "unified 
within а media, it is nol sell-sustaining. Indeed, the first and combination of sound Waves, having а myriad of frequen- 
second laws of thermodynamics require that the sound cics and amplitudes. This complex апау S responsively 
eventually dissipate its motion into hcat or other forms of promulgated through ihe ar from попа пр нашое TOU 
energy. Thercfore, if storage or preservation of the sound is ваг that is incredibly able to transfer the 1 ull experience to 
desired, it is necessary Lo transmute such motion into a fixed 50 the brain. Indeed, the full range of audible signal (20 to 
form of recording. This fixed form can then be recovered 20,000 Hz) 15 processed as 4 пас d experience, and 
later by conversion of the fixed form back into sound waves. includes сава subsonic bass Vibrations, S Wolas other 
In the earliest expericnces of recording, mechanical [тей iiM ак Impact the ЕЛЕНЕ елмен, 
devices were moved by impact of the sound waves to [t is also important to note that tliis same "pure" sound 
inscribe or etch a corresponding grove into a plate. Ву ss that arrives at Ше ear, сап be detected by a microphone and 
positioning a needle or other tracking device over a set of conscquently recor ded onto a fixed media such as magnetic 
moving grooves, crude reproduction of the original sound tape or compact disc. Although the microphone diaphragm 
waves was accomplished. More sophisticated technologies may nol have the sensitivity of a human ear, modern 
have developed which enable capture of sound waves in technology has been quite successful ш ellectively capturing 
other fixed lorms such as magnetic, electronic, and optical до the lull range ol souud experience. within the recorded 
media. Nevertheless, the same priuciple of sound reproduc- signal. For example, it 15 unnecessary to provide separate 
tion has бесп applicd to recover this stored information, microphones for recording both low and high range frequen- 
whether the response is generated by a mechanical mecha- cies. Instead, like the ear drum, the microphone, with its Ппу 
nism or by digitally controlled laser reading devices. sensing membrane, captures the [ull audio spectrum as a 
Specifically, stored signal is converted back to sound waves as 0 nificd ашау of sound waves and registers them as а 
by recrealing movement of ап object, which then sets the composite signal that can then be recorded onto an appro- 
surrounding air into motion corresponding to sound repro- = РА media. 
duction. It is therefore clear that the microphone is not the primary 
A primary goal of modern acoustic science is 10 reproduce limitation to elTective storage and subsequent reproduction 
pure sound, based ou conversion of the electronic, magnetic, 50 Of “pure” sound. Rather, the challenge of accurate sound 
mechanical or optical record into compression waves which reproduction arises with the attempt to transform the miero- 
сап be detected at the саг. The ideal system would play all phone output to compr ession waves through a mechanical 
original sound back through a resonating device comparable speaker. Accordingly, the locus ol effort for achieving a high 
to that which produced the sound in the beginning. [n other quality unilied sound system has been to develop a complex 
words, Ше violin sounds would be played back through a 55 speaker array which is able to respond to high, medium and 
violin, regenerating the overtones and а myriad of other low range frequencics, combining appropriate resonance 
dynamic influences that represent that instrument. Similarly, = chambers and sound coupling devices, to result in a closer 
a piccolo would be played back through a device that simulation of the original sound experience. 
generates the high lrequeucies, resonance aspects and over- This quest for improved sound reproduction has included 
tones associated with this type of instrument. [n short, one 60 studies of problems dealing with (a) compensating for the 
cannot expect a viola to sound like a viola in “pure” form if mass of the speaker diaphragm, (b) the resistance of air 
sound reproduction is actuated Бу a mechanical wave gen- within an enclosed speaker, (c) the resonant chamber con- 
erating device that does not embody unique characteristics figuration of the speaker, (d) Ше directional dillerences 
of that instrument or voice. Accordingly, il would seem that between high and low lrequencies, (е) Ше phase variation of 
the only practical way to reproduce Ше original "pure" 65 low versus high frequency wave trains, (f) the difficulty of 
quality of sound would be to isolate cach instrument or coupling speaker elements to surrounding air, and (g) the 
source, record its sound output, and then reproduce Ше loss of harmonics and secondary tones. Again, these aspects 
187 / 340 


199 / 570 


200 / 569 


5,889,870 


3 


represent just a few of the problems associated with recon- 
structing the sound wave by means of a direct radiating 
physical speaker. 

As an example of just one ol these issues, overcoming the 
mass of a speaker driver has remained a challenging prob- 
lem. Obviously, Ше purpose of the speaker driver and 
diaphragm is to produce a series of compression waves by 
reciprocating back and forth to form a wave train. ‘The initial 
design challenge is 19 compensate for resistance against 


tA 


4 


concept that mechanical systems, such as speakers, are 
required io reproduce audible sound. Clearly, it would be 
very desirable іо provide a means of sound reproduction 
which adopts a different approach, avoiding the many dif- 
ficultics represented by the choice of moving a diaphragm or 
speaker in order io generate sound. 


OBJECTS AND SUMMARY OF TOL 
INVENTION 
[Lis an object of the present invention to provide a method 


movement in speaker response Фос to inertia within the 1" and apparatus for indirectly emitting new sonic and subsonic 
speaker mass itself. Once the speaker driver is зет in motion, wave trains from a region of air without using a dircet 
however, the mass will seek io stay in motion, causing the radiating element to emit the wave trains. 
driver to overshoot, requiring [further compensation lor It is another object to indirectly generate at least one new 
delayed response lo reverse ils direction of travel. This sonic or subsonic wave train by using a by-product of 
conflict of mass and inertia recurs thousands of times cach 15 interference berween at least two ultrasonic signals having 
second as the speaker endeavors to generate the complex different frequencies equal to the at least onc new sonic or 
аттау of waves of Ше original sound embodied in Ше subsonic wave train. 
electrical signal received. It is still another object to cause at least (wo ultrasonic 
In order to meet the а Шсийу of compensating Гог mass, wave trains to interact in accor dance with the principles of 
as well as numerous other physical problems, speaker devel- 20 acoustical hetcrodyning 19 thereby extract intelligence from 
opment has focused mainly on improving materials and s ееп wave rama. : 
components as opposed to developing а different concept of Lis yet another object lo indirectly generate new sonic or 
sound generation. Diaphragm improvements, cone construc- subsonic Weve trains by combining them with an ultrasonic 
поп materials, techniques and design, suspensions, molor Согог Wave USINE amplitude modulation, emurng the coms 
units, magnets, enclosures and other factors have been 25 bined signal from an ultrasonic transducer, causing interfer- 
modified and improved. Nevertheless, the basic usc of a euce belween the carrier wave and another ultrasonic Пе- 
reciprocaling mass remains unchanged, despite an efficiency quency wave (тат, lo thereby create the new sonic or 
of less than 5 percent of the electrical power being converted subsonic Wane паша, : | — 
to acoustic output. . It is still another object to affect a physical state ofa living 
Electrostatic loudspeakers represent a different method- + being utilizing on indirectly created compression id 
ology. Unlike the clectrodynamic loudspeaker with its conc [t is still yel another object lo generale а new compression 
shaped diaphragm, the electrostatic loudspeaker uses a thin Ways which тв percep tible to human senses using al least муо 
electrically conducting membrane. Surrounding the plate аге m perceptible Campressión. WAVES; but without directly 
one or more fixed grids. When a signal voltage is applied lo _ 5 propagating the DEW COmPICSSIOn WAVE: 
the elements, the electrostatic force produced causes the ~ Yet another object of the invention is to gencrate a new 
diaphragm to vibrate. This low-mass diaphragm is particu- sonic or subsonic wave Irain without having lo overcome the 
larly useful as a bigh-lrequency radiating element, and ils mass aud. associated inertial limitations of a conventional 
operation can be extended 10 relatively low frequencies bv direct radiatiug element. 
the use of a sulliciently large radiating area. m Still another object of the invention is to gener ате 8 new 
Although clectrostatic speakers offer some advantages, sonic or su bsonic wave train without introducing, distortions 
they arc large, expensive, incfficicnt and suffer from the lack or undesired h armonics otherwise inherent to а conventional 
of point source radiated sound. Гог example, sound detec- direct radiating element. 
Поп is accomplished by a microphone al a localized or Another object is lo indirectly generate and enhance a 
approximate point source. To convert the detected sound to , NCW sonic ОГ subsonic wave train from within а resonant 
а non-point source, such as a large electrostatic diaphragm, Cavity by emitting at least two ultrasonic wave trains into the 
may create unnatural sound reproduction. Specifically, а resonant cavily. 
radialing electrostatic speaker 5 feet in height is limited in its Yet another object is to omni-directionally generate a high 
ability to simulate the delicate spatial image of a much Їтедиепсу wave train, thereby avoiding the highly locused 
smaller piccolo or violin. so 30d directional nature of high frequency signal emissions 
Another issuc in loudspeaker design is that the optimum typical of a conventional loudspeaker. 
mass and dimensions for low frequency radiating elements Still yet another object is to generate a new sonic or 
diller radically Пот those for high frequency. ‘This problem subsonic wave train iu a localized area without coupling to 
is Lypically addressed by providing both woofer and tweeter an associaled environment or enclosure which would oth- 
radiating elements for each channel of a loudspeaker system. ss erwise cause undesirable broadcasting of the sonic or sub- 
The implications of this design arc highly undesirable. The sonic wave train. 
phase shift introduced because of the differences іп time Yet another object is to generate a new sonic or subsonic 
delay for high frequency signals traveling (i) the shorter wave irain wherein characteristics of the new sonic or 
distance of the cone of a tweeter 10 a listener, versus (ii) the subsonic wave train are not limited by the characteristics of 
substantially longer path for low frequency signals from Ше во a direct radiating element. 
horn or woofer speaker to a listener's саг, can be in the range Another object of the invention is to emulate a sound 
of thousands of percent in phase differential. wave detection process typical of an approximate point- 
‘The preceding discussion of speaker technology is recited source detection device such as a microphone, but without 
primarily to emphasize the historical dilliculty of changing providing a physical detection device at a detection location. 
a stored form of sound to a compression wave capable of 65 —— Another object is to control the volume of a new sonic or 
reproducing sound in its original form. Nevertheless, the subsonic wave train by manipulating the degree of interac- 
prior art has been virtually dominated for sixty years by the tion of the at least two ultrasonic frequency wave trains. 
188 / 340 


200 / 570 


201 / 569 


5,889,870 


5 


Still another object is to emit a new sonic or subsonic 
wave train from a region of air as a by-product of modu- 
lating a single ultrasonic wave train emitted Пот a single 
ultrasonic transducer into the region in accordance with the 
principles of acoustical heterodyning. 

‘The present invention is embodied in a system which 
indirectly generales new sonic or subsonic waves trains. Іп 
one embodiment, a new sonic or subsonic wave train is 
emitted from a region of interference of at least two ultra- 
sonic wave trains emitled from al least two ultrasonic 


tA 


6 

Another aspect which is helpful to utilize Ше present 
invention is to understand Ше nature of Ше transmission 
medium. More specilically, tbe region of air in which ап 
acoustical heierodyning ellect occurs is referred io as the 
transmission mcdium. It is well known that the transmission 
medium of air provides an clastic medium for the ргорара- 
tion of sound waves. Thus, prior ай research has treated air 
as a passive element of the sound reproduction process. Air 
simply waits to be moved by a compression wave. 


transducers. ‘The principle of operation is based оп incorpo- B Conscqueatly, little pr actical attention has been devoted 
rating retrievable intelligence onto an ultrasonic carrier 19 the nature of air when it behaves non-lincarly. In the past, 
wave. The intelligence is retrieved as the desirable such non-linearity has perhaps been perceived as ап obstacle 
by-product of interference of the ultrasonic carrier wave 19 accurate sound reproduction. This is because it 15 under- 
train and another ultrasonic wave train. The ultrasonic wave Stood by those skilled in the art thal in extreme conditions, 
trains interlere within a region of non-linearity in accor- 17 alr molecules arc less and less able to follow the vibration of 
dance with principles identified by the inventor as “acous- а compression wave, such as that produced by a diaphragm. 
tical heterodyning,” and thereby generate by-products which Therefore, the tendency of research has been lo avoid 
include the dillerence and the sum of the two ultrasonic non-linear conditions. 
wave trains. А In contrast, the preseut invention appears to lavor Ше 

А system which easily demonsirates the principle of ^" existence of a non-linear transmission medium in order to 
acoustical hcterodyning comprises two ultrasonic frequency bring about the required heterodyning effect. Although air is 
transducers which are oriented so as to cause interference naturally non-linear when a compression wave moves 
between emitted ultrasonic wave trains. When the difference through it, the degree of non-linearity is relatively unob- 
in frequency between the two ultrasonic wave trains is in the ,. servable or inconsequenti al. However, when ultrasonic com- 
sonic or subsonic Педиепсу range, the dillerence in fre- ^ pression waves arc emitted so as to interfere in air, the 
quency is generated as а new, audible sonic ог new subsonic non-lincarity causes a surprising and unexpected result 
wave train emanating outward from within the region of which will be explained and referred to as Ше acoustical 
heterodyning interlerence. heterodyning elect or process. 

^ different embodiment of the system provides the advan- À The present invention draws on a variety of technologies 
tage оГ being comprised of only one ultrasouic direct radi- and aspects which have sometimes perecived as unrelated 
ating element. The advantage is not only in the decreased topics. These aspects of the invention include 1) indirectly 
amount of hardware, but the perfect alignment of the two generating а new sonic, subsonic or ultrasonic compression 
interfering ultrasonic wave trains because they are emitted wave, 2) superimposing intelligence on an ultrasonic carrier 
from the same radiating element. In effect, the new sonic or ¿ç Wave and reirieving the inielligence as the indirectly gen- 
subsonic wave train appears to be generated directly from crated compression wave, 3) causing at lcast two ultrasonic 
the ultrasonic emitter. If it were not for the inescapable | compression waves to interact in air and using the 
conclusion that the ultrasonic emitter cannot itself generate by-product of the interference, 4) using the principle of 
sonic or subsonic lIrequencies, plus the audible evidence that acoustical heterodyning to indirectly generate the new com- 
Ше sound is not emanating directly [rom the emitter, one 44 pression wave, 5) generaling the new compression wave 
might be deceived, from а relatively massless radiating element to avoid the 

The importance of the ficst embodiment is that it teaches distortion and undesirable harmonics of conventional dircet 
the concept of generating а new sonic or subsonic wave train radiating elements, 6) allecting a physical state of a living 
as а result of the interference between two ultrasonic wave being by generating subsonic frequencies in close proximity 
trains in accordance with the principles of acoustical het- 45 thereto, 7) generating an approximate point-source of sound 
сгодупшр. In essence, it is casier to sce that two ultrasonic that is phase coherent over the entire audio spectrum, 8) 
wave trains arc coming from two ultrasonic emitters. But the eliminating distortion in playback or broadcasting оғ sound, 
principle of acoustical heterodyning taught by this first 9) eliminating Ше “beaming” phenomenon inherent in emis- 
embodiment prepares the way lor understanding how the sion of high frequency compression waves from a direct 
second embodiment functions. И becomes apparent that the so radiating clement, 10) generating а new sonic or subsonic 
same acoustical heterodyning principle applics when it is compression wave which is independent of the characteris- 
understood which wave trains аге interfering in space. tics of the direct radiating element, and 11) ше detection ol 

A key aspect of the invention is the discovery that by sound without using a direct detection device at a detection 
superimposing sonic or subsonic intelligence onto an ultra- location. 
sonic carrier wave, this intelligence can be retrieved as а 55 ПІ should be remembered that all of these aspects of the 
new sonic or subsonic wave train. Whether the ultrasonic present invention arc possible without using a speaker or 
wave trains are generated from two emitters or from a single other form of direct radiating structure. Furthermore, these 
emitter, the ellect is the same. sonic or subsonic Irequencies are generated absolutely Пее 

Another aspect of the invention is the indirect generation of distortion and in a generally omni-directional orientation. 
of new compression waves without having to overcome the во The surprising result is the ability to recreate “pure” sound 
problems inherent to mass and the associated limitations of in the same form as when it was originally captured at a 
inertia of a conventional direct radiating clement. The microphone or other recording system. 
present invention eliminates a direct radiating element as the These and other objects, features, advantages and alter- 
source of a new compression wave so that Ше desired sound native aspects of the present invention will become apparent 
is generaled directly from a region of air and without the 65 to those skilled iu Ше ай from a consideration of the 
several forms of distortion all associated with direct radiat- following detailed deseription, taken in combination with 
ing speakers. the accompanying drawings. 

189 / 340 


201 / 570 


202 / 569 


5,889,870 


7 
BRIEF DESCRIPTION ОЕ THE DRAWINGS 


FIG. 1 is a block diagram of the components of a state of 
the art conventional loudspeaker system. 

FIG. 2 is a block diagram ofthe components of an indirect 
compression wave generation system which is buili in 
accordance with Ше principles ol one embodiment of the 
present invention. 

FIG. 3 is an illustration of the indirect and new compres- 
sion wave eencration using the apparatus of FIG. 2, includ- 


tA 


8 
presently looks at ways to improve the physical radiating 
element, such as the loudspeaker 10. The loudspeaker 10 
functions as a transducer, attempting to accurately reproduce 
sound recorded in an analog or preferably a digital format by 
converting an clectrical signal into compression waves 14. 
Therefore, generating compression waves has previously 
been a direct process as defined above. Vhe reproduced 
sound is generated direcily by a physical radiating element 
which vibrates at the frequency or frequencics which drive 


1b it. This vibration typically drives a loudspeaker cone or 
ing the acoustical heterodyning interlerence effect. diaphragm, which creates compression waves the human car 

ИС. 4 is a block diagram of the components of an indirect can hear when within the range of 20 to 20,000 cycles per 
compression wave generation system. second. l'or example, if the diaphragm vibrates al 1500 

FIG. ЗА is а graph showing how air responds increasingly cycles per second, an audible tone of 1500 Hz is generated. 
non-lincarly as the amplitude or intensity of sound increases, 15 Before proceeding further, it will be helpful to define 

FIG. 5B is a graph showing when air responds non- several terms to be used hereinafter. A “signal source” will 
linearly to a specific signal of a defined Педиепсу and interchangeably refer to a “signal generator" or "amplifier" 
amplitude. which provides electrical signals representative of compres- 

МО. 6A is a block diagram of the components of an sion waves to be emitted from a speaker. The term "speaker" 
indirect compression wave generation system. 20 will interchangeably refer to the terms “transducer”, 

FIG. 6B is an alternative embodiment of FIG. 6A. "emitter", “loudspeaker”, "diaphragm", “physical radiating 

f ; š А Е > element" or “direct radiating element” which converts Ше 

FIG. 7 is an alternative configuration of ultrasonic frc- "келге eene ia ci Жай аЙ угш. гайы adits 
queney transducers to indirectly pencrate compression зү ы vena ` 5 papapas БЫ ае 
wares ,, Pression waves, Тіс term "compression wave will inter- 

ARP | А : . 25 changeably refer to the terms “sound wave”, "longitudinal 

НО. 8 is another alternative configuration of ultrasonic wave” and “wave train” which are sonic, subsonic and 
frequency transducers lo indirectly generale compression ultrasonic waves propagating through a transmission 
ЖАУ | | | | | | medium such as air. 

FIG. 9 5 8 illustration of a. resonant cavity with two The present invention in a preferred embodiment teaches 
ulirasonic frequency signals being emitted Гот two trans- 50 a method and apparatus for indirectly generating а new 
quo compression wave. Indirect gencration refers to Ше absence 

МО. 10 is an illustration of a resonant cavity with two of a direct radiating element at the source of the new 
ultrasonic frequency signals being emitted from onc trans- compression wave generalion. Surprisingly, there is по 
ducer, __ physical radiating clement vibrating at the frequency of the 

FIG. П is a diagram of a hearing aid and headphones 35 newly generated compression wave. Instead, air molecules 
where the human ear canal is the resonant cavily. arc caused to vibrate at the desired sonic, subsonic or 

МО. 12 is a block diagram illustrating using the present ultrasonic frequency to thereby lunction as the radiating 
invention 10 detect sound. element and generate the new compression wave. The air 

ПО. 13 is an embodiment which teaches reflection of the m itself becomes the direct radiating clement, and becomes an 
ultrasonic frequency signals to develop acoustical effects. indirect source of the compression wave. 

к | rM n" Of prcatest interest to the present invention аге both sonic 
DETAILED DESCRIPTION OF TOE and subsonic frequencies. lhis is largely due to the difficulty 
INVENTION of directly generating these lrequencies without distortion. 

Reference will now be made to the drawings in which the 45 In contrast, it is thc папис of ultrasonic frequencies to bc 
various elements of the present invention will Бе piven capable of generation with much greater precision and with 
numerical designations and in which the invention will be less distortion. This occurs because the radiating clement is 
discussed so as lo enable one skilled in the art to make and typically more ellicient, smaller in size, and is less massive. 
use the invention. Accordingly, the ultrasonic radiating element is not subject 

‘The present invention is a dramatic departure [rom the «o 19 the same causes of distortion or to the same degree as arc 
teachings of the present state of the art. The creation of conventional speakers. Although it should be remembered 
compression waves is gencrally perceived to be a direct that the invention can generate new Compression waves al 
process. A direct process is defincd as causing а radiating ultrasonic, sonic or subsonic frequencies indirectly, the 
element 10 to vibrate at a desired frequency as shown in present focus looks al more significant applications with 
L1G. 1. The system of PIG. 1 is typically used to directly 55 SPEC to reproduction of music, voicc and all other forms 
generate audible and inaudible compression waves, both Ё Sound. 
above and below the range of human hearing. A conven- To generate a new compression wave, the present inven- 
tional compression wave generaling system is thus com- поп Г) makes use of al least two ultrasonic signals, 2) 
prised of a speaker element 10 which can be any dynamic, superimposes a desired sonic or subsonic signal onto one or 
electrostatic or other direct radiating element, and a signal бо both of the ultrasonic signals, 3) cmits the ultrasonic signals 
source such as a signal generator or amplificr 12. The signal from at least onc ultrasonic emitter 4) causes the ultrasonic 
source 12 supplies an electrical signal representative of а signals to interfere according to the principles of acoustical 
compression wave having a specific lrequency or frequen- heterodyning, and 5) generales a new compression wave 
cies al which the speaker element 10 will vibrate to produce Irom a region of heterodyning interference of the ultrasonic 
compression waves 14. 65 Compression waves. 

To improve the quality of sound from a sound reproduc- The advantages of this arrangement arc immediately 
tion system such as in FIG. 1, a person skilled in the art observable. For example, the ultrasonic component waves 

190 / 340 


202 / 570 


203 / 569 


5,889,870 


9 


do not impact upon the human car in a perceptible form and 
are therelore non-disiracting. Consequently, only the desired 
new compression wave is perceived by a listener and in a 
form capable of recreating the original dynamics of more 
ideal sound reproduction. 

Introduction of the present invention is best understoad by 
reference to PIG. 2. Other prelerred embodiments will be 
explained hereafter, based on the principles of this initial 
discussion. 


tA 


10 


produce a desired effect. Furthermore, the illustration of 
opposing and generally coaxial compression waves 30, 32 
should not be thought to depict the only orientation that the 
waves can have. 

It is worth noting before proceeding further that the 
acoustical heterodvning effect has been proven empirically, 
The evidence lies in the fact that at least onc new wave is 
crealed. The new sonic or subsonic compression wave 36 is 
verifiable by direci audible detection as well as by measur- 


Indirect compression wave generation is accomplished in 1 ing the frequency with an audio spectrum analyzer. 
a first embodiment as illustrated in FIG. 2. The fundamental However, unlike direct audible detection, the sum of both 
clements of the system include at least two ultrasonic Педиепстез can only be verified through measurement using 
acoustical transducers 20, an ultrasonic signal source 22, a an instrument such as the audio spectrum analyzer. Both the 
means lor combining signals 24, and an input 26 lo the sum and the difference һауе beeu measured to verily the 
means for combining signals which provides a signal to Бе 15 accuracy of these predicted results. 
superimposed upon a carrier signal. The ultrasonic signal As can be surmised, the particular acoustical heterodya- 
source 22 also luuctions as a means for controlling the ing effect which is of interest to the present invention is the 
frequency of signals being emitted from Ше at least two difference or Педиепсу subtraction of one ultrasonic wave 
ultrasonic acoustical transducers 20. The dotted line 28 train relative lo another. Consider a specific example which 
indicates that in this first embodiment, the orientation of the 2? explicitly provides the result of acoustically heterodyning 
transducers 20 arc coaxial. two different ultrasonic compression waves 30, 32. Assume 
The apparatus above is able to function as described the existence of a first ultrasonic frequency wave train (first 
because the compression waves 30, 32 inierlere т air fundamental wave) 30 of 100,000 Пух. Assume a second 
according to the principles of acoustical heterodyning (а „ ultrasonic wave train (second fundamental wave) 34 occurs 
phrase chosen by the inventor which describes the сест). <7 аг 100,900 Hz. An audible tone of 900 Hz is heard as the 
Acoustical heterodyning is somewhat of a mechanical coun- result of the first and the second ultrasonic wave trains 
terpart lo the electrical heterodyning effect which takes place interacting when one or both are of sufficient amplitude. The 
in а non-linear circuit. l'or example, amplitude modulation Irequency subtraction caused by Ше acoustical heterodyning 
in an electrical circuit is a helerodyning process. The bel- _ effect results in а 900 Их frequency lone being generated and 
сгодупе process itself is simply the creation of two new 3° heard as а new compression wave from a region of inter- 
waves. The new waves are the sum and the difference of two ference., 
fundamental waves. The generation ol a single-frequency merely illustrates 
In acoustical heterodyning, the new waves equalling the the core inventive principle. A greater appreciation of poten- 
sum and dillerence of the fundamental waves are observed ~; Па! for acoustic heterodyning is found in the following 
to occur when at least two ultrasonic compression waves 7^" applications. For example, if a single new uni-frequency 
interact or interfere in air. Presently, acoustical heterodyning compression wave can be generated, it should be realized 
has only been observed when both fundamental waves are thai even bass intense, multi-frequency signals such as live 
ultrasonic, thus generally above 20 КП. music, a voice or a transmission received via radio or 
The preferred transmission medium ol the present inven- 40 television can be апр Пей and played using the present 
tion is air because it is a highly compressible medium that invention. A tiny ultrasonic frequency transducer in a pocket 
responds non-lincarly under different amplitudes. This non- can conceivably reproduce with perfect clarity all the 
lincarity of air is what enables the heterodyning process to recorded frequencies of a live symphonic recording, perhaps 
lake place without using an electrical circuit. Полуемег, it even approaching the experience of being there. 
should be remembered Ша any compressible fluid can 44 Returning to a more detailed discussion of specific ele- 
function as the transmission medium if desired. ments of FIG. 2, an important and practical clement of the 
FIG. 3 illustrates that the indirect generation of a new invention is the single ultrasonic signal source 22 being used 
compression wave is made possible by the unexpected io supply the electrical signals representing the ultrasonic 
discovery that two ultrasonic wave trains 30, 32 experience Irequency wave trains 30, 32. The advantage of this arrange- 
а form of the acoustical heterodyning effect іп а non-linear 50 ment is that signal differences that might otherwise occur 
acoustical transmission medium such as air when they duc to variations in temperature or performance of two 
interfere. Air will rcspond more and more non-lincarly in а separate signal generators would likely [сад to drift between 
region 34 as amplitude and frequency increase. This region the Педиепсу values of the ultrasonic wave trains 30, 32. 
34 will extend as far as the compression waves 30, 32 are Furthermore, because ii is the dillerence in frequency 
interfering with each other. 55 between the two ultrasonic wave trains 30, 32 which is 
As related above, the acoustical heterodyning effect ultimately the frequency of interest, it is important to mini- 
results in thc creation of two new compression waves, the mize unwanted frequency variations of the ultrasonic wave 
sum and the difference of ultrasonic compression waves 30, ans 30, 3. 
32. The sum is an ultrasonic wave which is of little interest To eliminate drill, a single ultrasonic output source 22 
and is therefore not shown. The dillerence, however, сап be 60 generates а base frequency for both ultrasonic wave trains 
sonic or subsonic, and is shown as a compression wave 36 30), 32 so that the wave trains 30, 32 will drift together, if at 
which is emitted generally omni-dircetionally from the all. This configuration thus makes it casier to precisely 
region of interference 34. The shape of the new wave is control the dillerence in lrequencies and ultimately Ше 
generally dictated by the shape of the region of interference Irequencies of the new compression wave. 
34. In this illustration, the region 34 will be generally 65 116.2 also lists as a component of the system a means Гог 
cylindrical as would be scen if drawn in three dimensions. combining signals 24. This device performs the function of 
The shape of the region 34 can, however, be modified to modifying one or both of the ultrasonic wave trains 30, 32 
191 / 340 


203 / 570 


204 / 569 


5,889,870 


11 


being generated Бу the ultrasonic signal source 22. This 
modification consists of the means for combining signals 24 
by combining a first ultrasonic signal 38 with an electrical 
signal 40, representing the new compression wave 42 to be 
generated. The combination is defined as the sum of the first 
ulirasonic signal 38 and Ше desired compression wave 42 
and is transmitied as the second ultrasonic signal 42. 

The method of combining signals 38 and 40 in the present 
invention is preferably accomplished through amplitude 
modulation. Therelore the means lor combining signals 24 


12 


FIG. 6A illustrates the preferred embodiment of the 
invention. [n а comparison with ПО. 2, а significant differ- 
ence is the elimination of one ultrasonic transducer 20. 
Otherwise, the remaining ulirasonic transducer 20, the 
means for combining signals 24 and the ultrasonic signal 
source 22 remain substantially the same. It would seem 
counter-intuitive, however, to think that this arrangement is 
БИП able to accomplish the objectives of the present inven- 
tion. However, an analysis of the ultrasonic compression 


б wave be v t 7 ж о fa 
in the first embodiment is an amplitude modulator. 110. 2A ш 272 аи ши the Acoustical ner 
illustrates that amplitude modulation creates a signal having 2 ien nn BT © 7 
a fundamental frequency 60, an upper sideband 62, and a | l'irst, the electrical signals involved are the first ultrasonic 
lower sideband 64. In this invention, the upper sideband 62 signal 66 lico is the fundamental Ба ane the гое 
is used because il represents а non-inverled signal which |; signal ú which тер TURN the Bew some or subsonic Wave 
carries the information that will become the new "diller- ^ © be combined with the ultrasonic signal 66. The combi- 
ence” compression wave, nation of the signals 66, 68 creates à new cleetrical signal 70 

It might be apparcat that if the electrical signal which will composite as a new upper sideband that is the sum of signals 
benome the how compression wave 62 is amplitude móði- 66 and 68, along with signal 66, both ol which are emitted 
lated onto a l'undamental frequency 60, thal the ultrasonic ap пош the шше transducer 20 as а compression Waye 76. 
compression wave 30 or 32 (whichever is being modulated) ~~ А listener will hear the new compression Wave 76 from а 
needs по demodulation in order то be heard as the new region of interference 74 which eencrally can begin at a 
compression wave 62. The last clements of the system transmitting face of the ultrasonic transducer 20. Except for 
shown in FIG. 2 are the two ultrasonic acoustical transducers the audible evidence to the contrary, this might lead the 
20. ‘These acoustical transducers 20 аге designed to emit s hstener іо incorrectly conclude that the ultrasonic transducer 
compression waves al ultrasouic Irequencies. Examples of 20 is generating the пе Compression. Wave 76. By 
transducers 20 can be piczoclectric or clectrostatic devices, definition, the ultrasonic transducer 20 cannot directly gen- 
but may obviously include other radiating, elements for the erale audible Irequencies. Therefore, what one hears is the 
appropriate Irequency range. interfering. ul trasonic compression waves iuleracting iu 

While the first embodiment uses a single ultrasonic signal 50 accordance with the acoustical heterodyning ellect. Ц was 
source 22, it should be realized that it is possible to provide discovered that the two ultraso ше compiossion WAVES are 
separately generated clectrical signals to the ultrasonic trans- created from 1) the new electrical signal 70, and 2) the first 
ducers 20. FIG. 4 illustrates using, two separate ultrasonic ultrasonic signal 66. [езе respective compression waves 
signal sources 44, 46. The risk of this configuration is that corresponding 10 signals 66 and 70 m propagated at the 
frequency drift becomes a possibility. As a practical maller, 55 transducer 20, providing the required two ultrasonic wave 
this embodiment might also require some type of synchro- trains for acoustical hetcrodyaing interference. 
nization between the two ultrasonic signal sources 44, 46. FIG. 6B is also provided to show an alternative arrangc- 
For example, a synchronizing controller 48 might coordinate meni of components which more intuitively illustrates the 
emission of the two ultrasonic frequency signals 30, 32. iwo distinct ultrasonic SOIpIPesIOn WAVES 66 and 70 being 

МО. 5A is a graph provided to illustrate the principle of 40 transmitted іо Ше ultrasonic transducer 20 lor emission 
acoustical heterodyning by showing the relationship therefrom. The only meaningful difference between the two 
between the amplitude of a signal and the non-linearity of air embodiments is that PARE ultr OMe signals sources: 22 
in response to that signal. The restoring force is the force are shown Гог each of the ultrasonic compression waves, 
which a molecule of air will exert lo get back lo equilibrium The embodiments of FIG. 6A ог 613 are prelerred Гог 
when it is displaced. I! air were linear, Newion’s laws would 45 Many reasons. Гог example, the systems have one less 
teach us that air would respond to a given force which transducer 20, and will therefore be less expensive to 
displaces it with an equal and opposite force. However, the produce. The systems will also be lighter, smaller and, most 
graph illustrates that the restoring force docs not respond importantly, will have the greatest efficiency. 
linearly (which would be represented by a straight line) as The aspect of efficiency requires further discussion to 
the amplitude of a signal increases. Instead, the equation of зо understand some of the implications of the various embodi- 
the curve 52 is y=x+x", where air responds with a lincar ments. Whereas the first embodiment shown in FIG. 2 
component x, as well as a non-lincar component x^. The requires orientation of the ultrasonic transducers 20, no 
curve 52 thus represents that as amplitude of a signal orientation is required in 110. 6 because Ше single trans- 
becomes significant, the non-linear response of air begins to ducer 20 functions as the radiating element for both inter- 
increase more rapidly than the linear component in accor- ss lering signals. 
dance with the equation. Orientation of ultrasonic transducers 20 is important 

FIG. 3B is a graph provided to illustrate properties which because the system of FIG. 1 can be altered so as not to 
the signal must exhibit so that air will respond to it non- generate апу new compression wave. For example, if the 
linearly. lhe x-axis represents Педиепсу of Ше signal on а transducers 20 are oriented so that the ultrasonic compres- 
logarithmic scale. The y-axis represents Ше degree ol 60 sion waves 30, 32 never substantially cross, no new com- 
absorption in air by dB per 1000 feet. As shown, the line 30 pression wave can be ercated. Therefore, FIG. 7 showing а 
is nearly flat up to about 10 KHz. This is consistent with the slightly convergent path and FIG. 8 showing а gencrally 
experimental resulis confirming that sound waves ai lower parallel path both depict ultrasonic transducer 20 orienta- 
amplitudes do not appear to develop significant acoustical tions which will generally create sufficiently large regions of 
heterodyning. Air becomes substantially more non-linear as 65 interference so Ша а new compression will be generated. 
amplitude increases, thus enabling interference in accor- However, neither of these orientations appear to generate as 
dance with the principles of acoustical hetcrodyning. significant a region of interference as the orientations of 

192 / 340 


204 / 570 


205 / 569 


5,889,870 


13 


FIGS. 1 or 6. duc to Ше greater degree of interference 
represented. Ihis greater elliciency translates into greater 
energy transfer io Ше new compression wave and conse- 
quenily to а stronger or louder new wave. 

In contrast, the preferred embodiment will always gener- 
ate a new compression wave which has the greatest cffi- 
ciency. That is because no onentation of two ultrasonic 
transducers 20 will ever match or exceed the perfect coaxial 
relationship obtained when using the same ultrasonic trans- 


tA 


14 


to the contrary, the frequency response of a conventional 
loudspeaker 15 поі truly flat. Instead, it is a function of Ше 
{уре of frequency (bass, intermediate, or bigh) which it is 
inherently best suited lor emitting. Whereas speaker shape, 
рсошеиу, and composition directly affect the inherent 
speaker character, acoustical heterodyne wave generation 
utilizes the natural response of air to avoid geometry and 
composition issues and to achieve a truly flat. frequency 
response for sound generation. 


ducer 20 to emit both ultrasonic compression waves. This 1^ In general, it should be noted that this aspect of the present 
coaxial propagation from a single transducer would there- invention means that the final step in achieving truly indircet 
fore yield the maximum inierlerence pattern and most sound generation has been achieved. While the state of the 
ellicient compression wave generation. ап has advanced the ability to convert an analog signal to a 
Before moving lo other aspects of the invention, il is digital recording, and to even process the signal digitally, the 
important to realize that unusual sound effeets are possible 15 quality of sound reproduction remains limited by the char- 
with the highly directional ultrasonic transducers 20. It has acteristics of the analog transducer which has always been 
been observed that rellecting the at least two ultrasonic wave required as a speaker element. This is no longer the case 
trains al an object or surface causes the rellected waves to because the present invention achieves distortion free sound 
give an impression of localized source. Іп other words, the which is not hindered by a dircet radiating clement, with its 
reflected new compression wave appears to be coming from 20 attendant mass and inertial limitations. 
the object or surface of reflection. Distortion frec sound implics that the present invention 
This is represented in FIG. 13 and can be used to simulate maintains phase coherency relative to the originally 
a vanely оГ interesting acoustical ellects, including three recorded sound. Conventional speaker systems do not have 
dimensional sound. By simply directing the orientation of | this capacity because the frequency spectrum is broken apart 
the ultrasonic transducer 20 toward a ceiling or wall 96, onc <7 by a cross-over network for propagation by the most suitable 
can simulate the experience of sound emanating from that speaker clement (woofer, midrange or tweeter). By climi- 
location. П the transducer target is placed in motion, the naling the direct radiating element, the present invention 
moving reflective location creates an impression of move- makes obsolete the conventional cross-over network. ‘This 
meni [ог the sound or object being represented. By control- _ enables realization of a virtual or near point-source of sound. 
ling the orientation of the transducer with computer drivers, sid Another application of the present invention involves 
sound reproduction can be localized to individual faces on a 1 oobtrusively ecnerating, crowd-controlling subsonic sound 
movie screen or even ОЇ the screen in an overhead position, waves, Very low frequencies, such as thosc around 12 Hz, 
moving vehicles or aircraft, or any myriad of other sound have been shown 10 nauseale or disorient human beings and 
effects which can now only be imagined, 55 other animals. Prior elloris in using low frequency disori- 
A startling consequence of the present invention is the 7" entation has been hampered by a limited ability for localized 
generation of a new omni-directional compression wave. application. The present invention has demonstrated its 
Specifically, the new compression wave will generally radi- adaptation Гог rellected amplification, and thereby allows а 
ale outward omni-directionally [rom a region of more locused field of inlluence. l'or example, acoustic 
interlerence, generally in accordance with the shape of the ,, heterodyne generation ol low frequency sound could be 
region. However, the remarkable control which Ше present directed to a building, window or other reflective surface 
invention provides over the shape of the region of interfer- near a group of disorderly persons. The primary affect of this 
ence enables a perception of the described directionality to disorienting sound would be in the immediate area of 
be manipulated in unexpected ways. reflection, avoiding undesirable application to innocent 
l'or example, one or two ultrasonic transducers might be 4g bystanders, 
aimed at a wall or other object. The increased amount of Other advantages arise dircetly from the unique nature of 
interference between two ultrasonic compression waves the ultrasonic transducers 20. Because of their small size and 
which will occur because of the reflection will cause most of low mass, such transducers arc generally not subject to the 
the sound to be generated omnui-directionallv from near the many limitations and drawbacks of conventional radiating 
object being reflected from. Likewise, bringing the two so elements used in loudspeakers. l'urthermore, the use of 
ultrasonic frequency transducers 20 of FIG. 2 closer together ultrasonic transducers 20 at extremely high frequencies 
limits the length of interference and consequently more avoids the distortion, harmonics and other undesirable fea- 
closely approximates а near point-source of sound. tures of a direct radiating element which must reproduce 
Another significant advantage of the present invention is sound directly іп the low, mid and high [requency ranges. 
that sound is reproduced [rom а relatively massless radiating 55 Consequently, the many l'avorable acoustic properties of a 
clement. In the region of interference, and consequently at relatively distortion free ultrasonic transducer system can 
the location of new compression wave generation, there is now be transferred indirectly into sonic and subsonic 
no direct radiating element. This l'eature of sound generation by-products. 
by acoustical heterodyuing can substantially eliminate dis- L1G. 9 illustrates an additional aspect of the present 
tortion ellects, most of which are caused by the radiating 60 invention relating to ап ability to generate and enhance 
element or conventional speakers. For cxample, harmonies sound within a broadly resonant cavity 80. A resonant cavity 
and standing waves on a loudspeaker cone, cone overshoot 80 is any cavity 80 which enables interacting ultrasonic 
and сопе undershoot caused by iuertia, and the imperfect compression waves 30, 32 to interfere in accordance with 
surface of the cone itself are all factors which contribute to the principles of acoustical heterodyning. Although Ше 
signal distortion attributable to a dircet radiating clement. 65 broadly resonant cavily 80 is not necessary to create Ше 
А direct physical radiating clement has other undesirable effect of interference, it seems to enhance or amplify the 
characteristics as well. Despite certain manufacturer claims effect by increasing interference, as well as reinforcing the 
193 / 340 


205 / 570 


206 / 569 


5,889,870 


15 


audio byproduct ог “difference” frequencies. This means 
that two ultrasonic Педиепсу signals 30, 32 сап be trans- 
mitted inio the cavity 80 from almost any perspective. Гог 
example, ПО. 9 shows two ultrasonic frequency transducers 
20 emitting ultrasonic frequency signals 30, 32 into cavity 
80. The signals 30, 32 arc reflected off the walls of cavity 80 
a mulliple numbers of times to increase interference. 

ИС. 10 shows an improved configuration of the broadly 
resonant сауну of 110. 9 which only requires a single 


tA 


16 

Ап interesting twist of thc invention 15 a reverse applica- 
tion of the technology for sound detection. In other words, 
instead of reproducing sound, the invention might be used to 
detect sound as shown in FIG. 12. More specifically, the 
invention can function as a substitute for a point-source 
sound detection device such as a microphone. Typically, a 
microphone musi be physically positioned al a desired 
location of sound detection in order to operate. The present 
invention coables compression waves to be converted into 
an electrical signal by a transducer 20 without providing a 


ultrasonic transducer 20 to generate а now compression р physical microphone element at a detection location. 
wave. Тіс system is improved becau se of the perfect coaxial Essentially, а single transducer 20 might be used to focus 
relationship between the two ultrasonic compression waves ultrasonic compression waves 30 at the desired detection 
30, 32. location 102. Acoustical vibrations, such as a voice or music, 
One implication of the broadly resonant cavity 80 of — will interact with the ultrasonic compression wave 30. Ву 
FIGS. 9 and 10 is that thc human car canal is also a broadly 12 monitoring a decrease in output level of the ultrasonic 
resonant cavity, and can thus be used to enhance Ше new compression wave 30, it should be possible to determine the 
compression wave. This result offers a particular advantage frequencies of the audible compression wave which is 
for the headphone and hearing aid industry. l'or example, a impacting on the ultrasonic compression wave 30. This 
hearing aid 90 as shown in PIG. И which embodies Ве might be done by using a wavelorm analyzer 104 to deter- 
present invention сап be used to reproduce the entire audio ^" mine the decrease in output level caused by coupling of the 
spectrum of sounds for a listener, enabling а high fidelity ultrasonic compression wave 30 with the audible sound 
reproduction, rather than the characteristic “tinny” sound of waves 102. It is to be understood that the above-described 
a conventional hearing aid. Likewise, any headphone or embodiments are only illustrative of the application of the 
headset 92 can be modified to take advantage of the present principles of the present invention. Numerous modifications 
invention, and generally with less weight and size than ^' and alternative arrangements may be devised by those 
conventional systems with a dramatic extension to fre- skilled in the art without departing from the spirit and scope 
quency response. of the present invention. ‘The appended claims are iniended 
Another interesting aspect of the invention lacilitates to cover such modifications and arrangements. 
privacy of communication as part of a wireless system. This ., — ll is 10 be understood Ша Ше preceding description is 
arises because of the “beaming” effect inherent with the use © given to illustrate various embodiments of the present inven- 
of an ultrasonic transducer 20. By nature, ultrasonic com- tive concepts. The specific examples are not to be considered 
pression waves propagate in а narrow Бсаш, which can as limiting, except in accordance with the following claims. 
easily be targeted on specific objectis or locations. It is What is claimed is: 
therefore possible to aim a transducer 20 across a noisy ог - 1. ^ system lor indirectly generating and enbancing al 
crowded room and direct audible messages only into an car least one audible frequency from within a resonant cavity by 
of an intended listener. Those around the listener would Бе interaction between at least two ultrasonic frequency signals 
unaware of the audible communication because of the of different Педиепсу, said system comprising: 
non-reflective character of the ear and the narrow beam a resonant cavily which enables interacting ulirasonic 
width of the ultrasonic waves. Private instructions could 4, signals to interfere in accordance with acoustic hetero- 
therefore be given on radio and television production areas, dyning to generate an audible sound output within air 
performance stages for cucing, and other applications where contained within the resonant cavity, said resonant 
one-way prompting would be helpful. cavily Including an opening lor permitting entry of the 
Surprisingly, the present invention can also eliminate ultrasonic signals; 
unwanted environmental noise pollution. Our society has 4g an ultrasonic [requency emiller contained within one of a 
coined the phrase “boombox” to refer to portable sterco sterco headphone, a hearing aid, or an audio headset, 
systems which have relatively large bass speakers. The said emitter being directed toward the opening of the 
boombox derives its name from the annoying side affect of resonant cavily for transmitting first and second ullra- 
a booming and repeated “thump” of Ше bass speakers sonic signals along а common axis into the resonant 
driving large volumes of air. Полуемег, the term is also 50 cavily without indirect reflection [rom other sources; 
sometimes used to refer to a car or other vehicle with even modulating means coupled to the ultrasonie frequency 
larger bass speakers. Because the speakers are integrally emitter for eencrating the second ultrasonic frequency 
allached to Ше vehicle, the frame or any loudspeaker enclo- having a difference in value relative to the first ullra- 
sure in general, the enclosure itself becomes a radiating sonic frequency which is equal to the at least one 
element. Consequently, persons outside the vehicle will be ss audible frequency; 
hit with wave upon wave of dull thumping sounds, а means for concurrently operating the ultrasonic frequency 
nuisance at best. emitter and the modulating means to generate the first 
The present invention can thus advantageously eliminate and second ultrasonic signals, and 
the coupling of the enclosure to the direct radiating element means [or directing the first and second ultrasonic signals 
by generating the new compression wave in midair. The 60 into the resonant cavity. 
listener inside can still enjoy Ше experience of loud bass 2. The system as defined in claim 1 wherein the resonant 
frequencies within the confines of the vehicle. However, the cavity has a configuration corresponding to a human car 
lower lrequeucies will noi be directly coupled to the vehicle canal. 
frame because the radiating element is now a point in air. 3. A method Гог indirectly generating and enhancing аі 
Consequently, undesirable bass broadcasting into the envi- 65 least one audible frequency from within a resonant cavity 
ronment beyond the immediate vicinity of the listener is using at least two ultrasonic signals of different frequency 
significantly reduced. the method comprising the steps o£ 
194 / 340 


206 / 570 


207 / 569 


5,889,870 


17 


1) transmitting a first ultrasonic signal into the resonant 
cavily using an emiller contained within one of a stereo 
headphone, a hearing aid, or an audio headset; 

2) concurrenily transmitting a second ultrasonic signal 
from said emitter into the resonant cavity along а 
common axis with the first ultrasonic signal wherein 
the second ultrasonic signal has a frequency which 
differs [rom the first ultrasonic signal by a value gen- 
erally equal to the at least one audible Педиепсу, and 


tA 


18 


second ultrasonic wave train has a base frequency equal 
то the base frequency of the first ultrasonic wave train 
and is projected along a common axis lor both the first 
ultrasonic wave train and second ultrasonic wave train, 
which common axis is the only transmission path 
between said transducer means and a reflective surface 
of an object which is distant from the listener; 
varying the base frequency of the second ultrasonic wave 
train through a frequency range corresponding to a sum 


wherein the resonant cavity amplifies the interference 12 a . 
berween the first and the second ultrasonic signals; of the base frequency and the new audible sound wave 
3) whereby at least onc audible frequency arises from the тп apd i . 
interference of the first and the second ultrasonic sig- 4) reflecting the first and second ulirasonic wave trains 
nals within the resonant cavilv. from said a rellective surface to generale omni- 
4. A method for indircetly generating, omni-dircetional 15 directional dispersion of audible sound leaving a 
sound as part of an audio sound system for entertainment usc virtual, localized sound source at the reflective surface. 
by a listener and having a remote virtual source distant from 5. The method as defined in claim 4 wherein the method 
the listener, said omni-directional sound comprising at least comprises the additional step of generating both the (1) first 
one new sonic or subsonic wave train which isa difference | ultrasonic frequency aud (ii) the second ultrasonic frequency 
of at least two interacting ultrasonic wave trains having ^" from a single ultrasonic generating means, thereby elimi- 
frequencies of different value, the method comprising the nating frequency drift between the first and the second 
steps of: ultrasonic frequencies. 
1) emitting a first ultrasonic wave train including a base 6. A method as defined in claim 4, further comprising the 
Irequency into a region of air from a transducer means; 25 Мер of controlling Ше movement and orientation of the 
2) concurrently emitting a second ultrasonic wave train wave train with a computer driver. 
from said transducer means into the region to thercby 
interact with the first ultrasonic wave train wherein the ж ж + * ¥ 
195 / 340 


207 / 570 


PDF SECTION: 


UNITED STATES PATENTS. 


E 


209 / 569 


United States Patent пя 


Monroe 


[54] 


[75] 


[73] 
[ * ] 


[21] 
[22] 


[51] 
[52] 
[58] 


156) 


METHOD OF AND APPARATUS FOR 
INDUCING DESIRED STATES ОҒ. 
CONSCIOUSNESS 


Robert A. Monroe, Nelson County, 
Va. 


Interstate Industries Inc., Faber, Va. 


The portion of the term of this patent 
subsequent to May 25, 2010 has been 
disclaimed. 


: 664,176 
Mar. 1, 1991 


Int, CES anis A61M 21/00 
US: a оха 600/28; 128/732. 
Field of Search .................................... 600/26-28; 

128/731-732 


Inventor: 


Assignee: 
Notice: 


References Cited 
U.S. PATENT DOCUMENTS 


2,466,054 4/1949 Siebel. 
3,160,159 12/1964 Hoody et al. . 
3,576,185 4/1971 Schulz её al. . 
3,712,292 1/1973 Zentmeyer, Jr. . 
3,753,433 8/1973 Bakerich et al. . 
3,826,243 7/1974 Anderson. 
3,837,331 9/1974 Ross. 

3,884,218 5/1975 Monroe. 
4,034,741 7/1977 Adamsetal. 
4,141,344 2/1979 Barbara . 


ПЛАНА A A 


US005356368A 
[ii] Patent Number: 5,356,368 


[43 Date of Patent: * Oct. 18, 1994 
4,227,516 10/1980 Meland et al. . 


4,335,710 6/1982 Williamson . 
4,573,449 3/1986 Warnke . 


4,834,701 5/1989 Masaki . 

4,883,067 11/1989 Knispel et al. ........................ 600/28 
5,036,858 8/1991 Carter etal. . 

5,101,831 4/1992 Koyama et al ..................... 600/26 


Primary Examiner—Lee S. Cohen 

Assistant Examiner—3. P. Lacyk 

Attorney, Agent, or Firm—Sughrue, Mion, Zinn, 
Macpeak & Seas 


[57] ABSTRACT 


Improved methods and apparatus for entraining human 
brain patterns, employing frequency following response 
(FFR) techniques, facilitate attainment of desired states 
of consciousness. In one embodiment; a plurality of 
electroencephalogram (EEG) waveforms,. characteris- 
tic of a given state of consciousness, are combined to 
yield an EEG waveform to which subjects may be 
susceptible more readily. In another embodiment, sleep 
patterns are reproduced based on observed brain pat- 
terns during portions of a sleep cycle; entrainment prin- 
ciples are applied to induce sleep. In yet another em- 
bodiment, entrainment principles are applied in the 
work environment, to induce and maintain a desired 
level of consciousness. A portable device also is de- 
scribed. 


28 Claims, 21 Drawing Sheets 


LEFT HEMISPHERE 
BRAIN WAVES 


ЕРІ 


0 j 


10 15 


LEFT FREQUENCIES - Hz 


197 / 340 


209 / 570 


0,5. Patent Oct. 18, 1994 Sheet 1 of 21 5,356,368 


LEFT HEMISPHERE | RIGHT HEMISPHERE 
BRAIN WAVES BRAIN WAVES 
ЕРІ TM FP? 
0 5 10 15 0 5 10 15 
LEFT FREQUENCIES - На RIGHT FREQUENCIES - Hz 
FIG. 1А FIG. [В 
FOREHEAD 


| 2 
Е d z 


5 


И И 


ЦЕ; d 
E 


LEFT RIGHT 


eo == 
а... златен 


7 
л d Y 


MAXIMUM 
AMPLITUDE 


TOPOGRAPHIC BRAIN MAP OF 
NEOCORTEX 4-8 Hz 


210 / 569 198 / 340 


210 / 570 


U.S. Patent 


LEFT HEMISPHERE 
BRAIN WAVES 


AAMAMM, 


5 0 3 10 5 


0 5 D 
LEFT FREQUENCIES - Hz 
FIG. 1D 
LEFT 
MAXIMUM 
AMPLITUDE 


211/569 


Oct. 18, 1994 


Sheet 2 of 21 5,356,368 


RIGHT HEMISPHERE 
BRAIN WAVES 


MIA, 


RIGHT FREQUENCIES - He 


FIG. ТЕ 


FOREHEAD 


RIGHT 


ы с 
0. Ж 


(0m al 
БЫН а ИШ Ш 


JA" LLLLELI 
LLLI? 

uar 
12 


"ERN 


« ті 
ААА IT. 


TOPOGRAPHIC BRAIN MAP OF 
NEOCORTEX 4-8 Hz 


199 / 340 


U.S. Patent Oct, 18, 1994 Sheet 3 of 21 5,356,368 


FIG. 2 


DISPLAY +~ 30 


212 / 569 200 / 340 212 / 570 


Sheet 4 of 21 5,356,368 


Oct. 18, 1994 


17,8. Patent 


AlddA$ 83404 


T ковена 
1531 
yi Wi | 
A ЕН 1198 
ч 4, %1 %! I 
MOT 1198 di cH cy 
DG M ы 
Y Yi 3192 326€ 
P bY cu 
Lr. «2 7 ; 
Ы 100 NI < аю 
11989; 
076207 10098! 
. A+ 100981 > 
q31Y 1533 60 7 Wo аи ШТ қ 
ТЕ 
4 
10068 
л01+ 20 
031719380 
Yol 
yol 30; 
018 63 By . 
1000 <b 


Ж | с 914 


“7 


213 / 570 


201 / 340 


213 / 569 


Sheet 5 of 21 5,356,368 


Oct. 18, 1994 


U.S. Patent 


ТД <р adr: 
ТІПТІ KONIHI +T 9 
71 67 
by n 
X001 
e 
££ T 
89 


OV WOU cf 


i 


SE 00 НОН | 
98 10 WO 


00 HOU б 


ТЕКТЕГІ! 
V WOW] [10 ROY ог 


CA RON tl EU 

1 Uu 0 0 
cll ROY b ( TRI 
£i] HOY SI Qt SO MON 
btg МОН 9) ¿b 90 ИОН 


Std ROH Л 


y bt 
3% 00 HO 
p ut 


“| нома 


7 


МОН | 


T нов Ipujaju: 


20} №0] BLE 
33 jousayxe 
10; бъ 911 


(1u09)g 7913 


214 / 570 


202 / 340 


214 / 569 


Sheet 6 of 21 5,356,368 


Oct. 18, 1994 


U.S. Patent 


114510 


£ 90 Hid 
60 Nd 
9 0 HVd | 
ПРИМ | 
1931 81 20 В | 
Live ПЕШТЕ; 
[ДИП 
11 
101D31DUI шоу 204091рш Wd 


i| 00 iyd 
0% 10 УУЗ 

00 Wd 
8 fd НУ 
G %0 YYd 

60 WVd 

90 ud 
è 10 8У4 
v8 00 ЧУ 
9 60 УМ 
8 O10 УУ 
18 110 BVd 
82 210 Hd 
1L £M] Bd 


ІШ 14510” 
(61794670 | 


Еоведван 
81 


SL 84510 
ç 1480 


#062509 
uz 


06с450Н 
01 


#064509 
62 


[9 00 HVd | 
84510 21 £t 10 Ну9 
1410 Gl М с; Wd 
"34510 9 l| EC NWd | 
04510 S Р bi HVd 
724010 91 ПИЕТЕ 
84510 61 91 90 ЧУЧ 


ДЕЦА 


b 913 ш 


215 / 570 


203 / 340 


215 / 569 


Sheet 7 of 21 5,356,368 


Oct. 18, 1994 


U.S. Patent 


lfldNI HOLIAS 


113110 QUAY — T Азов 


m|] 8800} рио asiou 
2094 O] мор а 


“Ч01404940 {Ou ou 


WOOV W090 | 203 убщ 91) 
INO HOT м 


ПАЙТ. 
„= ММУ 
27274 09944 ^3 usa 
егі 37 ONE uf =н 
A lu т "o жи [TITIO ll emm 
ШТІ ин 

š | И 

кы d 
| s| HHHH 
gni | Hn | lN 


6913 


216 / 570 


204 / 340 


216 / 569 


Sheet 8 of 21 5,356,368 


Oct. 18, 1994 


U.S. Patent 


£f 


$34345 
18918 


18 


100) 
029 


(1009) G 913 


217 /570 


205 / 340 


217 / 569 


U.S. Patent 


асхалавчаа Рах 


тиым ви? 


Осі. 18, 1994 


Sheet 9 of 21 


5,356,368 


HP !GFF 


218/50 


U.S. Patent Oct. 18, 1994 Sheet 10 of 21 5,356,368 


taxed 1 


ау 


HBR Н 


амы TAMNG ла. 


219 / 569 219 / 570 


U.S. Patent 


Oct. 18, 1994 


ТаКТ: 148 END:185 


Sheet 11 of 21 


SR:64 


„ав 


— MR 


5,356,368 


220/570 


U.S. Patent Oct. 18, 1994 Sheet 12 of 21 5,356,368 


4.083 


— 


221/ 569 221 / 570 


U.S. Patent Oct. 18, 1994 Sheet 13 of 21 5,356,368 


HP 


SIK 


ста 


АР 


ANY TERS START:1  EHD:58 A 5 


222 / 569 222 /570 


U.S. Patent Oct. 18, 1994 Sheet 14 of 21 5,356,368 


SOUND 
LEVEL 
DETECTOR 


L.G.H. SPEAKER 


SOUND 
CENERATOR 


R.C.H. SPEAKER SELECTOR 


220 200 290 


223 / 569 211 / 340 223 / 570 


224 / 569 


U.S. Patent Oct. 18, 1994 Sheet 15 of 21 


FIG. 8A 


300 SIGNAL 


GENERATOR 


SPEAKERS/ HEADPHONES 


212 / 340 


5,356,368 


224 /570 


Sheet 16 of 21 5,356,368 


Oct. 18, 1994 


U.S. Patent 


nee | ТАТТУ A^ 


по 
9 


301 АЗ k 
Hby 


1002242 
#7 
2 
b 
£l 
HI 
bi А 
PT 
| H 
ObObOHbL 
| 27 
100: 
£j 
v 89 913 


01 


H 


ООН 
£2 


25-87-67 91-22 : 90^ 
91-VZ 8-61 8-27 :QN9 


225 / 570 


213 / 340 


225 / 569 


U.S. Patent Oct. 18, 1994 Sheet 17 of 21 5,356,368 


FIG. SA 


"Baseline" Brain Waves 
ЕЕ POWER (Huv pp) 
30 0-4Hz- 18.8% 
4-8Hz- 9.2% 
% 8-i2Hz- 16.2% 
10 12-30Hz= 49.2% 
0 
-|0 
-20 
-30 
214 / 340 | 226 / 570 


226 / 569 


U.S. Patent 


MOOD-MINDER Stimulus Frequencies 
POWER | 


(uVpp) 
10 


8 
6 
4 
2 


0 


<> 


MOOD-MINDER Stimulus Wave 
ANPLITUDE 


(uV) 
30 


20 


М000-МІНОЕК Response Broin Wave 
AMPLITUDE 


(uV) 
30 


20 


227 / 569 


5,356,368 


POWER(%uV pp) 


16Н7= 41.6% 
0182- 23.2% 


Awake and Alert 


POWER(%uV" рр) 


l6Hz- 47.6% 
21Hz= 23.2% 


Awake and Alert 


РОЖЕН Жуугрр) 


i6Hz- 46.5% 
21Н2= 23.7% 


Awake and Alert 


227 [570 


U.S. Patent 


КОС MINDER Stimulus Frequencies 
(uv2pp) 


10 
8 
6 
4 
2 


0 
0 


MOOD-MINDER Stimulus Wave 
AMPLITUDE 


(чү) 
30 


20 


M00D-MINDER R i 
AMPLITUDE esponse Brain Wave 


(uV) 
30 


20 


228 / 569 


Sheet 19 of 21 


5,356,368 
POWER(%uVpp) 
21Hz- 13.3% 
8Hz- 22.1% 
4Н2= 35.5% 
Concentration 
POWER(%uV pp) 
| 21Н2- 13.3% 
BHz= 22.1% 
4Н2= 35,5% 
Concentration 
POWER(%uV° рр) 
2182- 14.3% 
8Hz- 21.5% 
4Нт- 31.5% 
Concentration 


228 / 570 


U.S. Patent 


MOOD-MINDER Stimulus Frequencies 
POWER 


(uV pp) 
19 


8 
6 


>> 


MOOD-MINDER Stimulus Wave 
AMPLITUDE ` 


(uV) 
30 


20 


MOOD-MINDER Res Brain W 
res: ponse Brain Wave 


(чу) 
30 


20 


229 / 569 


5,356,368 


POWER(%uYĉpp} 


IGHz= 11.5% 
THz- 28.4% 
4Hz- 30.2% 


Attention 


POWER(%u¥" pp) 


IGHz= 11.5% 
THz= 28.4% 
4H2- 30.2% 


Attention 


POWER(% UV" рр) 


16Н2= 8.2% 
THz= 28.7% 
4Н2= 32.6% 


Attention 


229 / 570 


U.S. Patent Oct. 18, 1994 Sheet 21 of 21 5,356,368 


NOOD-MINDER. Stimulus Frequencies | 
(u¥2pp) POWER ("su V^ pp) 
19 GHz: 9.5% 
4Hz= 15.4% 
ы 1.581= 19.6% 
6 ` Relaxation 
4 
2 
0 
0 20 40 60 
Hz 
MOOD-MINDER Stimulus Wave Е | б. 91 
AMPLITUDE | 
шыл POWER(%uY pp) 
6Hz- 9.5% 
e 4 Нг- 15.4% 
10 | 1.5Hz= 19.6% 
0 Relaxation 
-10 
-20 
-30 
Aap ABER Response Brain Wave FIG. 3 M 
(чү) POWER(%uV pp) 
ы GHz- 7.9% 
20 &Hz- 16.856 
10 1.5H2=20.0 % 
0 Relaxation 
-10 
-20 
-30- 


230 / 569 218 / 340 


230 / 570 


231 / 569 


5,356,368 


1 


METHOD OF AND APPARATUS FOR INDUCING 
DESIRED STATES OF CONSCIOUSNESS 


CROSS-REFERENCE TO RELATED 
APPLICATION 


The present application is related to copending appli- 
cation No. 07/514,460, filed Apr. 16, 1990 now U.S. 
Pat. No. 5,213,562. 


BACKGROUND OF THE INVENTION 


L. Field of the Invention 

Те present invention relates to an improved method 
of inducing desired states of consciousness, including 
different levels of sleep, in human beings, using a tech- 
nique known as frequency following response (FFR), 
developed by the present inventor. The invention also 
relates to apparatus for performing the method. A num- 
ber of areas of applicability of the invention are de- 
Scribed, in accordance with different preferred embodi- 
ments. 

2. Description of the Background Art 

In a prior patent, U.S. Pat. No. 3,884,218, the present 
inventor described a method of inducing different levels 
of sleep, using the FFR technique, in which brain waves 
could be made to follow superimposed frequency pat- 
terns. These frequency patterns were provided as sine 
waves, at frequencies known to correspond to different 
levels of sleep, such as alpha (exhibiting brain wave 
activity in the range of 8-12 Hz), theta (6-8 Hz), and 


5 


10 


25 


30 


delta (1-4 Hz). EEGs exhibiting frequencies between 12 . 


and 30 Hz (known as a beta range) are characteristic of 
awake individuals, though beta activity at even higher 
frequencies has been observed in different types of men- 
tal activities. Gamma activity has been characterized as 
all activity above 30 Hz; until recently, it has not been 
possible to monitor brain activity in the gamma range. 
(It should be noted that the boundaries between gamma 


and beta, beta and alpha, alpha and theta, and theta and . 


delta are somewhat arbitrary; the foregoing delineations 
are intended to be exemplary and not limiting.) 

The present inventor discovered that the human 
brain could be entrained to output brain wave patterns 
these different frequencies. While frequencies corre- 
sponding to these different levels of sleep are not audi- 
ble, by superimposing those frequencies on some type of 
sound, such as music, it was determined to be possible to 
induce desired levels of sleep. Тһе individual listening 
to the music would “hear” the low frequencies, with the 
desired effect on brain activity. 

An improvement on the inventor's patented tech- 
nique, to induce varied states of alertness, is the subject 
of copending Application No. 07/514,460, the contents 
of which are hereby incorporated herein by reference. 
This copending application describes a general FFR 
technique using what is known as a binaural beat phe- 
nomenon, details of which are provided in that applica- 
tion. Briefly, a binaural beat is produced by sending 
signals at different frequencies (some Hz apart, depend- 
ing on the desired effect) to an individual’s left and right 
ears. The difference between the frequencies defines the 
frequency of the binaural beat. Using this technique, the 
desired frequency can be introduced into the individu- 
al’s brain activity, inducing the desired state of con- 
sciousness. 

The induction of FFR in the human brain in this 
manner results in the synchronization of activity in the 
hemispheres of the brain. FIG. 1A shows brain activity 


35 


40 


45 


50 


60 


65 


2 
without FFR, and FIG. 1B shows brain activity with 
ЕЕК. The inventor has coined the term HEMI-SYNC 
(for Hemisphere Synchronization) to describe this phe- 
nomenon. 

The copending application describes a technique 
wherein, in one form, sine waves having a frequency 
corresponding to a consciousness state are superim- 
posed on two different carrier frequencies to form two 
different signals to set up the binaural beat. In another 
form, an actual brain pattern, based on an electroen- 
cephalogram (EEG) waveform indicative of that con- 
sciousness state is superimposed on the different carrier 
frequencies to form two different signals. In use, each 
signal is provided to one ear of a subject. The difference 
in carrier frequencies sets up the binaural beat. 

Another, more limited application of the binaural 
beat phenomenon is found in U.S. Pat. No. 4,834,701. In 
contrast to the narrow range of frequencies discussed in 
that patent, in the above-mentioned copending applica- 
tion, the applicability of the binaural beat phenomenon 
is investigated over a much wider range of frequencies, 
spanning the spectrum of brain activity. 

Through additional investigation involving mapping 
of brain activities of different individuals, the present 
inventor has discovered some significance to the fact 
that, while brain waves at certain frequencies are char- 
acteristic of different levels of sleep, brain patterns of 
different individuals still vary. The inventor has investi- 
gated possible enhancements to the FFR effect by mak- 
ing it more generic among individuals, yet still more 
specific to brain activity than a simple sine wave, or an 
EEG of a particular individual. 

Another area of investigation being performed by the 
present inventor relates to human sleep patterns. Based 
on current knowledge of human sleep patterns, it ap- 
pears that sleep is composed of a series of 90-minute 
cycles. As stated earlier, the beta stage is one of alert- 
ness. The first sleep state is alpha, or mental and physi- 
cal relaxation. The second is theta, or light sleep. Next 
is delta, or deep sleep. The inventor has investigated the 
possibility of providing FFR waveforms in cyclic pat- 
terns, replicating these human sleep patterns, to facili- 
tate sleep. Another possibility is to take advantage of 
the cyclic nature of sleep patterns to provide a more 
gentle wake-up for a sleeper. 

In considering the need for alertness during activities 
such as work, the inventor also considered how it might 
be possible to introduce FFR waveforms into ambient 
noise in one's surroundings to facilitate maintenance of 
desired states of consciousness. Particularly in environ- 
ments such as factories, or in offices where office equip- 
ment puts out consistent types of noise, it would be 
desirable to be able to introduce a binaural beat into that 
noise at different frequencies, to enhance the degree of 
alertness of factory or office workers as desired. 


SUMMARY OF THE INVENTION 


In view of the foregoing, according to one aspect of 
the invention, EEGs for a number of individuals in 
different states of consciousness are sampled, and EEG 
waveforms for the group of individuals, corresponding 
to each identifiable state of consciousness, are com- 
bined. A binaural beat then is generated using the com- 
bined EEGs. 

According to this aspect of the invention, it has been 
determined that using groups of EEG waveforms from 
different individuals and combining them to obtain a 


219 / 340 


231/570 


232 / 569 


5,356,368 


3 


representative waveform yields a waveform that a per- 
son's brain is more likely to replicate than an individual 
EEG waveform, or a sine wave representation of the 
EEG waveform. The combination may be simple aver- 
aging, though other combination techniques, such as 
weighted averaging, for combining different. numbers 
of EEG. waveforms as desired, are contemplated. Now 
that the inventor has discovered that combinations of 
EEG waveforms provide a particularly effective en- 
trainment environment, it will be seen that various ways 
of combining these waveforms may yield greater or 
lesser effects. 

In accordance with another aspect of the invention, a 
method for replicating cyclic sleep patterns for a de- 
sired sleep period is provided. In a preferred embodi- 
ment according to this aspect of the invention, a subject 
is led from beta, to alpha, to theta, to delta, then back to 
theta, then alpha, then a rapid-eye movement (REM) or 
light dreaming sleep, in a sequence of 90-minute cycles, 
during a sleep period of desired duration. After the 
expiration of the period, the subject may wake up vol- 
untarily. Alternatively, the invention can provide а 
gentle external stimulus to lead the subject to a beta 
state. 

With respect to this aspect of the invention, an appa- 
ratus is provided which automatically leads an individ- 
ual through these cyclic sleep patterns, and enables the 
individual to set a desired sleep period. This device 
preferably takes advantage of the techniques to be de- 
scribed relative to the first-mentioned aspect of the 
invention, but is not so limited. The inventive contribu- 
tions of this second aspect of the invention are consid- 
егей to Пе in the combination of hardware itself which 
generates the desired sequence of binaural beats, as 
opposed to the particular software which determines 
the nature of those binaural beats. In one form, the 
invention is constituted by an alarm clock which pro- 
vides a fade-in theta-alpha signal followed by a strong 
beta-gamma signal shortly before a desired wake-up 
time. 

According to yet another embodiment of the inven- 
tion, selectable mind-affecting sound patterns are pro- 
vided to supplement constant ambient noise in any envi- 
ronment. When the noise is not present, the patterns are 
not provided. The patterns vary in amplitude in accor- 
dance with changes in the environmental noise. 

In accordance with still another embodiment of the 
invention, a portable system is provided to enable the 
wearer to introduce binaural beat signals of frequencies 
that are selectable in accordance with a desired level of 
awareness. Depending on the level of sophistication of 
the device, the binaural beat may be generated using the 
combined EEG waveforms of the first aspect of the 
invention, but this last aspect of the invention is not so 
limited. 


BRIEF DESCRIPTION OF THE DRAWINGS 


The foregoing and other aspects of the invention will 
be understood by those of working skill in this techno- 
logical field by reference to the following detailed de- 
scription of the preferred embodiments of the invention, 
read in conjunction with the accompanying drawings, 
wherein: 

FIGS. 1A-1C and 1D-1F taken from the above-men- 
tioned copending application, show one example of the 
results which can be achieved using the inventive tech- 
niques; 


10 


20 


25 


40 


45 


50 


55 


60 


65 


4 


FIG. 2 is a block diagram of the hardware according 
to a second embodiment of the invention, and FIGS. 
3-5 are more detailed schematics therefor; 

FIGS. 6A-6J are drawings, similar to FIGS. 1A and 
1B, but showing brain activity during various stages of 
a sleep cycle, using a technique in accordance with the 
second embodiment of the invention; 

FIG. 7 is a block diagram of hardware in accordance 
with a third embodiment of the invention; 


FIG. 8A is a block diagram of hardware in accor- . 


dance with a fourth embodiment of the invention, and 
FIG. 8B a schematic of that hardware; and 

FIGS. 9A-9M are graphs of different possible effects 
of the. embodiment of FIGS. 8А and 8B, showing а 
baseline brain pattern, selected stimulus frequencies and 
corresponding stimulus waves, and associated response 
waves. 


DETAILED DESCRIPTION OF THE 
PREFERRED EMBODIMENTS 


The method according to a first preferred embodi- 
ment of the invention, which has been developed 
through extensive experimentation, derives from the 
empiricaliy-observed phenomenon that brain patterns 
of human subjects are entrained more readily to brain 
patterns which more closely match their own. In prior 
implementations of the FFR technique, such as in the 
inventor’s prior patent, in which sine waves having 
frequencies corresponding to desired levels of sleep 
were superimposed upon a given frequency, entrain- 
ment did occur. Use of the binaural beat phenomenon 
yielded better results, through synchronization of the 
hemispheres of the brain. 

However, simple repetitive frequencies, or even com- 
binations of such frequencies within different ranges, do 
not represent brain patterns per se, but rather provide 
entrainment environments for the brain to follow. It has 
been determined that, the more closely the entrainment 
environment parallels normal brain function at different 
levels of consciousness, the more effective the entrain- 
ment effect. This phenomenon is what led to the im- 
provement disclosed in the above-mentioned copending 
application. 

As a further improvement on that technique, as men- 
tioned above, the present inventor investigated the pos- 
sibility of creating more generic models of brain func- 
tion at different levels of consciousness. As a result of 
that investigation, it was determined that combinations 
of EEG waveforms from different individuals function- 
ing.at the same identifiable level of consciousness (e.g. 
alpha sleep, theta sleep, or deita sleep) provided a supe- 
rior entrainment environment. In the inventive method 
according to this aspect of the invention, the brain pat- 
terns of 40 to 50 individuals were combined to yield the 
entrainment environment. 

One area of applicability of the techniques of the 
present invention is in the area of sleep therapy. Many 
individuals suffer from sleep disorders to varying de- 
grees. It is possible to provide a suitable entrainment 
environment, based on known sleep cycles prevalent in 
humans, to help individuals to regulate their sleep pat- 
terns, and thus help to solve their sleep disorders. One 
embodiment of the invention, shown in FIG. 2 and also 
іп FIGS. 3-5, implements the inventive techniques in 
what the inventor calls a Sleep Processor to aid in the 
regulation of human sleep cycles. 

In FIG. 2, a read-only memory (ROM) 10 stores 
frequency sequences corresponding to different parts of 


220 / 340 


232 / 570 


33 / 569 


5,356,368 


5 

а human sleep cycle. The stored frequency sequences 
may be in accordance with a predetermined algorithm, 
or alternatively may provide a less complex entrain- 
ment environment, such as simple averaging. A digital 
signal processor (DSP) 20 selects different ones of these 
sequences based om the current time and the time to 
which an alarm is set. The time is displayed on display 
30, and is set using time set 40. The alarm 15 set to а 
desired wake-up time using alarm set 50. 

During operation, the DSP 20 accesses the ROM 10 
and provides an output to a pulse code modulator unit 
(PCM) 60 accordingly. The PCM 60 provides an output 
to each of left and right channel speakers 70, 80 which 
are provided in close proximity to the ears of a human 
subject. Using headphones enhances the effect. 

Some additional detail of operation of the DSP 20 in 
one aspect of this embodiment now will be provided. A 
serial port in the DSP 20 generates an interrupt at a 50 
KHz rate. An interrupt handler іп the DSP 20 computes 
the various sounds, in one form, by generating sine 
waves using a pair of integrators: 

cosine = соѕіпе + frequency X sine 

sine=sine—frequency X cosine 
The Sleep Processors needs ten frequencies, five for 
each channel, and all of these frequencies are generated 
at the same time. The results are multiplied by ten en- 
velopes, most of which are zero at any moment. 

Noise is generated by a well-known 16-bit shift-regis- 
ter algorithm. This algorithm generates a noise signal 
that repeats every 65535 samples, or about every five 
seconds. The noise is filtered to sound more like pink or 
red noise, and less like white noise, and is written into а 
delay line in RAM. For each channel, the filtered noise 
is averaged with an earlier sample from the delay line, 
thus imparting a comb filter response to it. 

An additional low-frequency sine/cosine pair is gen- 
erated, to sweep the comb filter delay. 32-bit arithmetic 
is used here. The approximate sweep rate is about 1/8 
Hz. The low-frequency sine wave is used directly to 
sweep the delay on one channel. The delay on the other 
channel is controlled by some mix of the sine and cosine 
waves. By choosing these and other coefficients prop- 
erly, any phase and amplitude relationship between the 
left and right sweep can be obtained. The comb filtered 
noise for each channel is multiplied by a noise envelope 
value. 

The device is operated as follows. A desired wake-up 
time is set, much like an alarm clock, and the desired 
volume is selected. A start/stop button then is pressed 
to start the cycles for the selected sleep period. 
Throughout the sleep period, the device repeats a 90 
minute cycle of sound that leads the subject through 
alpha, theta, delta, and back to dreaming sleep. Five 
minutes before the scheduled wake-up time, a beta sig- 
nal is introduced to bring the subject back to complete 
physical wakefulness. When the subject wakes up, he/- 
She hits the start/stop button again to stop the sound 
sequence. 

The sounds produced by the DSP 20 include binaural 
beat carrier sound patterns utilizing both amplitude and 
frequency modulation, masking pink sound (a known 
type of sound described in the copending application), 
and, optionally, occasional single-word voiced affirma- 
tions. The binaural beat audio signals may be in the form 
of appropriate sine waves, or alternatively may be repli- 
cas of actual EEG brain waveforms. Іп the latter case, 
either the just-described combined EEG waveforms or 
asingle EEG waveform (as described in the copending 


15 


20 


25 


30 


35 


45 


50 


55 


60 


65 


6 


application) жау be used. The entire pattern of sound 
and control is generated algorithmically. 

One aspect of the effectiveness of the device of FIGS. 
2-5 is the spacing of sound carriers at related frequen- 
cies so as to engender binaural beat signals not only 
from channel to channel, but also monauraily, in each 
audio channel. In this preferred embodiment, three 
binaural beat frequency signals are created between 
audio carrier channels, and two amplitude beats per 
channel also are created, yielding a total of seven beat 
signals. The inventor has coined the term Septon for 
this set of beat signals. One example of a septon is as 
follows: 


Left Channel Right Channel 
200 Hz carrier (4 Hz binaural beat) 204 Hz carrier 
(4 Hz monaural (4 Hz monaural beat) 
beat) 
204 Hz carrier (4 Hz binaural beat) 208 Hz carrier 
(4 Hz monaural) (4 Hz monaural beat) 
beat) 
208 Hz carrier (4 Hz binaural beat) 212 Hz carrier 

А standard program according to this preferred em- 
bodiment would employ the following sound sequence: 


0-5 minutes: 

Signal Group A (comprised of replicated EEG wave- 
forms having dominant values in the alpha range) 
Signal Group В (15 dB below Group А, generated 
simultaneously with the sounds of Group А, and com- 
prised of replicated EEG waveforms having dominant 
values in the theta range) 

Phased Pink Sound (six seconds, peak-to-peak, on both 
left and right channels, 20 dB below Group À) 

Voice Inserts (repeated at 40 second intervals, 10 dB 
below Group A, simultaneously with the other sounds, 
and comprising short sequences of phrases like “relax” 
“let go", and *sleep") 

5-20 minutes: 

Signal Group В 

Signal Group C (20 dB below Group B, generated si- 
multaneously with Group B, and comprised of repli- 
cated EEG waveforms having dominant values in the 
delta range) 

Phased Pink Sound (15 dB below Group B, having a 
duration as in the first interval) 

Voice Inserts (10 dB below Group B, comprised as 
above) 

20-40 minutes: 

Signal Group C 

Signal Group D (10 dB below Group C, generated 
simultaneously with Group C, and comprised of repli- 
cated EEG waveforms having dominant values in the 
lower delta range) 

Phased Pink Sound (10 dB below Group C, having a 
duration as in the fixst interval) 

Voice Inserts (20 dB below Group C, comprised as 
above) 40-65 minutes: 

Signal Group D 

Phased Pink Sound (10 dB below Group D, having a 
duration as in the first interval) 

Voice Inserts (20 dB below Group D, comprised as 
above) 65-80 minutes: 

Signal Group C 

Signal. Group D (10 dB below Group C, generated 
simultaneously with Group C) 

Phased Pink Sound (15 dB below Group C, having a 
duration as in the first interval) 


221 / 340 


233 / 570 


234 / 569 


5,356,368 


NO voice inserts 

80-90 minutes: 

Signal Group B 

Signal Group C (10 dB below B, generated simulta- 
neously with Group B) 

Phased Pink Sound (15 dB below Group B, having a 
duration as in the first interval) 

NO voice inserts 

The foregoing sequence is repeated through the sleep 
period until the wakeup sequence, approximately five 
minutes before the set wake-up time: 

Signal Group AA. (a wakeup sequence, comprising 
replicated EEG waveforms having dominant values in 
the beta range, or alternatively a 400 Hz/416 Hz enve- 
lope yielding frequencies in the beta range) 

Voice inserts (10 dB below Group AA, comprised of 
Short phrases such as “waking up”, “refreshed”, 
"bright", and repeated at intervals) 

One variation of the foregoing embodiment is an 
alarm clock which, instead of sounding a loud alarm or 
other jarring noise at wake-up time, starts a gentle se- 
quence of signals some minutes before, to bring an indi- 
vidual up gently through the various levels of sleep to 
full wakefulness. A fade-in theta-alpha signal may be 
provided, followed by a stronger beta-gamma signal. 

FIGS. 6A to 6J show the effects of the just-described 
"sleep processor" embodiment. Column 1 shows distri- 
bution of delta frequencies; column 2 shows distribution 
of theta frequencies; and column 3 shows distribution of 


alpha frequencies. The top row of graphs is the actual. 


pattern observed in the individual, and the bottom row 
is the baseline pattern. 

FIG. 6A corresponds to a normal waking state. Dom- 
inant alpha activity is shown in the occipital area of the 
brain. In FIG. 6B, pink noise has been applied, without 
any beat frequencies. A narrower focus of waking state 
is shown. 

In FIG. 6C, a signal sequence corresponding to Sig- 
nal Group A has been applied. Some gain in theta fre- 
quencies are seen, with rapid diffusion of alpha frequen- 
cies and movement toward the vertex of the head. In 
FIG. 6D, a signal sequence corresponding to Signal 
Group B has been applied. There is further diffusion of 
alpha frequencies, with some movement of delta and 
theta activity toward the pre-frontal cortex of the brain. 

In FIG. 6E, a signal sequence corresponding to Sig- 
nal Group C has been applied. There is rapid diffusion 
of alpha frequencies, and increased power of theta and 
delta frequencies. In FIG. 6F, a signal sequence corre- 
sponding to Signal Group D has been applied. Alpha 
frequencies are diffused further toward the pre-frontal 


cortex, and there is a marked increase in theta and delta: 


frequencies. 

FIG. 6G, continuing application of Signal Group D 
frequencies, shows a marked increase in delta activity in 
the pre-frontal cortex, with a steady decrease in alpha 
activity at the vertex. In FIG. 6H, another binaural beat 
stimulation has been applied, and characteristics of 
stage 3 and 4 sleep may be observed. In FIG. 6I, further 
evidence of the further binaural beat stimulation is ob- 
served. Delta is the dominant frequency here. Alpha 
and theta activity has moved to the prefrontal cortex. 
Finally, FIG. 6) shows early awakening activity, with a 
diffusion of delta activity. 

FIG. 7 is a block diagram of hardware in accordance 
with another embodiment of the invention, having ap- 
plication to the work environment, or anywhere a con- 
Stant source of noise is present, to allow workers, for 


15 


20 


25 


30 


40 


45 


55 


60 


65 


8 


example, to maintain a desired state of awareness. The 
device may contain suitable digital signal processor 
circuitry, as in the preceding embodiment. One differ- 
ence is that the operation of the.device is keyed to the 
presence of ambient noise, not to a given time duration 
or selected sleep period. 

The device of FIG. 7 includes a sound generator 200 
which, as just mentioned, may comprise a digital signal 
processor. The generator 200 outputs sound patterns via 
one or more speakers (left and right channel speakers 
210, 220 are shown). A sound level detector 230 detects 
the level of ambient noise in the room, and provides a 
signal to the sound generator 200), or activates a cut-off 
switch (not shown), to discontinue output of the sound 
generator 200 when the ambient noise level drops 
below a predetermined level. 

The sound level detector also preferably provides a 
signal to the sound generator 200 to boost the sound 
pattern output when the ambient noise level increases, 
so that the effect of the provision of the sound pattern is 
commensurate with the noise level in the room. Alter- 
natively, the user may simply adjust the volume manu- 
ally, using one or more knobs (not shown) on the sound 
generator 200. 

А timer 240 may be provided to control the duration 
of provision of the selected sound pattern, or even to 
change the sound pattern at different times of day by 
controlling a selector 250 which the user accesses to 
select a particular sound pattern to be output. The user 
may select a given sound pattern in the morning, and 
the timer 240 may change that pattern automatically, 
based on a need at different times of day for sound 
patterns providing different states of alertness. 

The sound pattern produced by the device of FIG. 7 
varies automatically in amplitude in accordance with 
changes in the ambient noise, and is discontinued when 
the noise stops. As a result, the sound remains unobtru- 
sive. Depending on the setting, the produced sound 
pattern can enhance wakefulness, promote relaxation 
(as, for example, in rest areas in the workplace), reduce 
anxiety and stress, or focus attention, among other char- 
acteristics. 

The basic system of FIG. 7 produces and inserts four 
different sound patterns which are selected manually so 
as to merge the output into the constant ambient noise. 
More sound patterns are possible, depending on the 
desired overall capabilities of the system. Various modi- 
fications are possible. For example, а programmable 
version may be provided, which changes the form of 
the sound patterns throughout a work day or night, in 
accordance with the responses desired. 

Selectability of patterns may be accomplished differ- 
ently in a model intended for use in conjunction with a 
computer system. The computer operator can input a 
selection, and may vary that selection as desired 
throughout the work day. 

FIG. 8A is a diagram of a portable embodiment of the 
invention, for use in providing a desired level of con- 
sciousness on an individualized basis. A signal generator 
300 preferably includes a digital signal processor 310 
and a ROM 320 for storing predetermined signals or 
sequences of signals which correspond to various de- 
sired states of awareness. The signal generator 300 may 
be a simple tone generator or pair of tone generators 
which provide outputs to speakers or headphones 330 
(such as button-sized headphones) to set up a binaural 
beat. Output of pink sound or phased pink sound by the 


generator 300 is desirable to facilitate defocusing of the . 


222 / 340 


234 / 57 


235 / 569 


5,356,368 


9 

listener and consequent ability to concentrate on the 
sounds being produced. A selector 340 enables a user to 
instruct the signal generator 300 to output signals corre- 
sponding to the level of consciousness (e.g. focused 
concentration, relaxation, alertness) that a user desires. 

. FIG. 8B shows a schematic of this embodiment, 
which the inventor calls a “Mood Minder”. This em- 
bodiment includes a selector for selecting one of four 
possible types of signals, corresponding to four respec- 
tive levels of awareness: awake and alert; concentration; 
attention; and relaxation. However, the invention is not 
so limited, as the generator 300 may be capable of pro- 
ducing other possible types of signals. Alternatively, 
pre-set patterns in the generator 300 may vary when 
specialized use is required. The key to this embodiment 
is its portability, enabling the user to carry the device 
everywhere. The device is battery-operated, and is 
smali enough to fit in an upper coat pocket, for example. 

FIGS. 9A-9M show examples of prestored patterns 
produced by the generator 300, and of results achieved 
in use. FIG. 9A shows baseline brain waves, with rela- 
tive power output shown at the right for different fre- 
quencies. FIGS. 9B, 9E, 9H, and 9K show the stimulus 
frequencies produced for four different respective states 
of consciousness. FIGS. 9C, 9F, 9I, and 9L show the 
stimulus waves corresponding to the superposition of 
the stimulus frequencies on the baseline wave. FIGS. 
9D, 9G, 97, and 9M show the results achieved in use. As 
can be seen, the peak-to-peak amplitudes for the re- 
sponse brain waves correspond closely to those of the 
stimulus waves. 

While the present invention has been described in 
detail with reference to preferred embodiments, various 
modifications within the scope and spirit of the inven- 
tion will be apparent to those of working skill in this 
technological field. Consequently, the invention should 
be considered as limited only by the scope of the ap- 
pended claims. 

What is claimed is: | 

1. A method of inducing desired states of conscious- 
ness in human beings, comprising the following steps: 

combining a plurality of replicated electroencephalo- 

gram (EEG) waveforms, each indicative of a par- 
ticular desired state of consciousness, to produce a 
combined EEG waveform; 

superimposing said combined EEG waveform on 

two separate sets of carrier waves using stereo 
` sound; 
creating differential beat frequencies between said 
sets of carrier waves based on said superimposing 
Step; and 

providing the resulting signals in audio form to re- 
spective ears of a human being, to induce said state 
of consciousness. 

2. А method as claimed in claim 1, wherein said com- 
bining step comprises mathematically averaging said 
EEG waveforms to produce said combined EEG wave- 
form. 

3. A method as claimed in claim 1, further comprising 
the step of repeating said combining, superimposing, 
and creating steps for each of a set of desired states of 
consciousness, and producing a cycle of sets of resulting 
audio signals, said providing step comprising providing 
said cycle of sets of resulting audio signals to respective 
ears of a human being, to induce each of said desired 
states of consciousness in cyclic fashion. 

4. A method as claimed in claim 3, wherein said cycle 
corresponds to human sleep patterns, said desired states 


20 


25 


35 


40 


45 


50 


55 


60 


65 


10 
of consciousness comprising wakefulness, alpha sleep, 
delta sleep, and theta sleep. 

5. А method as claimed in claim 3, wherein said cycle 
corresponds to human sleep patterns, said desired states 
of consciousness comprising alpha sleep, delta sleep, 
and theta sleep, said cycle being approximately 90 min- 
utes long. 

6. A method as claimed in claim 5, said method fur- 
ther comprising the steps of providing a plurality of 
repetitions of said cycle, followed by providing a set of 
audio signals containing a binaural beat at a frequency 
indicative of beta consciousness. 

7. A method as claimed in claim 1, wherein said creat- 
ing step includes the step of combining pink sound with 
said sets of carder waves by shifting of said pink sound 
with respect to said combined EEG waveform from 
one stereo audio channel to another, with cyclic 
changes in amplitude, frequency, and rate of panning. 

8. Apparatus for facilitating sleep in a human subject, 
comprising: 

means for setting a wake-up time to select a desired 

sleep duration; 

means for generating a first sequence of signals in a 

cycle corresponding to a human sleep pattern, 
frequencies of said signals in said first sequence 
being substantially equal to frequencies of human 
brain patterns at different levels of sieep; 

means for repeating said cycle a plurality of times 

based on the selected wake-up time; and 

means for waking up said human subject at the se- 

lected wake-up time. | 

`9. Apparatus as claimed in claim 8, wherein said 
means for waking up said human subject comprises 
means for generating a second sequence of signals a 
predetermined time before the selected wake-up time, 
frequencies of said signals in said second sequence being 
substantially equal to frequencies of human brain pat- 
terns at or near an awakened state. 

10. Apparatus às claimed in claim 9, wherein said 
predetermined time is approximately five minutes. 

11. Apparatus as claimed in claim 8, wherein said first 
sequence of frequencies comprises, in order, alpha fre- 
quencies, theta frequencies, delta frequencies, and theta 
frequencies. 

12. Apparatus as claimed in claim 8, further compris- 
ing means for generating phased pink sound in conjunc- 
tion with said first sequence of frequencies. 

13. Apparatus as claimed in claim 8, wherein said first 
sequence of signals comprises a plurality of sets of com- 
bined brainwaves, each of said sets corresponding to а 
different level of sleep. said combined brainwaves 
within a given set being constituted by combined elec- 
troencephalogram (EEG) waveforms of a plurality of 
individuals, taken when said individuals had attained a 
different respective level of sleep. 

14. Apparatus as claimed in claim 43, wherein said 
EEG waveforms are mathematically averaged. 

15. Apparatus for awakening an individual using 
brain pattern entrainment, said apparatus comprising: 

means for selecting a wake-up time; 

means for keeping time; and 

means, operative a predetermined period before said 

wake-up time as determined by said means for 
keeping time, for producing а first sequence of 
signals having frequencies in the theta-alpha range, 
followed by a second sequence of signals having 
frequencies in the beta-gamma range. 


223 / 340 


235 / 570 


236 / 569 


5,356,368 


11 

16. Apparatus as claimed in claim 15, wherein said 
means for producing said first and second sequences of 
signals comprises means for producing said second se- 
quence of signals at a higher amplitude than said first 
sequence of signals. 

17. Apparatus.as claimed in claim 15, wherein said 
first sequence of signals comprises a plurality of sets of 


combined brainwaves, each of said sets corresponding 


to a different level of consciousness, said combined 
brainwaves within a given set being constituted by com- 
bined electroencephalogram (EEG) waveforms of a 
piurality of individuals, taken when said individuals had 
attained a different respective level of consciousness. 

18. Apparatus as claimed in claim 16, wherein said 
EEG waveforms are mathematically averaged. 

19. Apparatus for inducing a desired state of con- 
sciousness, said apparatus comprising: 

means for detecting presence of a predetermined 

level of ambient noise; 

means, responsive to said detecting means, for gener- 

ating signals having frequencies substantially equal 
to frequencies of human brain patterns when said 
ambient noise is present; and 

means for selecting said signals in accordance with 

desired human activity in said areas. 

20. Apparatus as claimed in claim 19, further compris- 
ing timer means, connected to said generating means, 
for generating said signals for a predetermined time set 
by said timer means. 

21. Apparatus as claimed in claim 19, wherein said 
timer means is connected to said selecting means to 
enable selection of different ones of said signals in ac- 
cordance with desired human activity at different times 
of day. : 

22, Apparatus as claimed in claim 19, wherein said 
generating means comprises means, responsive to said 
detecting means, for increasing an amplitude of said 
signals in response to an increase in amplitude of said 
ambient noise, and for decreasing an amplitude of said 


10 


20 


25 


35 


40 


45 


50 


55 


60 


65 


12 


signals.in response to а decrease in amplitude of said 
ambient noise. 

23. Apparatus as claimed in claim 22, wherein said 
generating means further comprises means for discon- 
tinuing said signals when said ambient noise fails below 
said predetermined level. 

24. Apparatus as claimed in claim 19, wherein said 
generating means comprises a digital signal processor 
and a read-only memory (ROM) connected to said digi- 
tal signal processor, said ROM storing a plurality of sets 
of signals, each of said sets of signals having frequencies 
substantially equal to human brain patterns at a desired 
state of consciousness. 

25. Apparatus 25 claimed in claim 24, wherein each of 
said sets of signals comprises a plurality of sets of com- 
bined brainwaves, each of said sets corresponding to а 
different level of consciousness, said combined brain- 
waves within a given set being constituted by combined 
electroencephalogram (EEG) waveforms of a plurality 
of individuals, taken when said individuals had attained 
a different respective state of consciousness. 

26. Apparatus as claimed in claim 25, wherein said 
EEG waveforms are mathematically averaged. 

27. Apparatus for awakening an individual using 
brain pattern entrainment, said apparatus comprising: 

means for selecting a wake-up time; and 

means, operative a predetermined period before said 

wake-up time, for producing a first sequence of 
signals having frequencies in a first predetermined 
range corresponding to a first state of conscious- 
ness, followed by a second sequence of signals 
having frequencies in a second predetermined 
range corresponding to a second state of conscious- 
ness. 

28. Apparatus as claimed in claim 27, wherein said 
first predetermined range is the theta-alpha range, and 
said second predetermined range is the beta-gamma 


Tange. 
k ж ж ж ж 


224 / 340 


236 /570 


PDF SECTION: 


UNITED STATES PATENTS. 


E 


238 / 569 


United States Patent пя 


Lowery 


НО 


US005159703A 
[11] Patent Number: 5,159,703 


[4] Date of Patent: Oct. 27, 1992 


154) 
[76] 


[21] 
[22] 
[51] 
[52] 


[58] 


[56] 


SILENT SUBLIMINAL PRESENTATION 
SYSTEM 


Inventor: Oliver M. Lowery, 5188 Falconwood 
Ct., Norcross, Ga. 30071 


Appl. No.: 458,339 
Filed: Dec. 28, 1989 


Int, СІЗ ................... НОВ 7/00; HO4R 25/00; 
HAR 3/02 

U.S. Cl. cene: 455/42; 455/46; 
455/66; 381/73.1; 128/420.5 

Field of Search ..................... 455/46, 47, 66, 109, 
455/110, 42-43; 381/73.1, 105, 124; 
358/141-143; 600/28; 128/420.5; 380/38 


References Cited 
U.S. PATENT DOCUMENTS 


3,060,795 10/1962 Corrigan et al. .................... 352/131 
3,278,676 10/1966 Becker .................. asss, 358/142 
3,393,279 7/1968 Flanagan ........... ... 128/420.5 
2,712,292 1/1973 Zentmeyer, Jr. .... 600/28 
4,141,344 2/1979 Barbara ........................--. 600/28 


SPEECH BALANCED 
AMPLIFIER 'ODULATOR 


CARRIER 
OSCILLATOR 
(455 KHz) 


FILTER 


4,395,600 7/1983 Lundy et al. sse 381/73.1 
4,463,392 7/1984 Fischer et al. ........................ 360/30 
4,777,529 10/1988 Schultz et al. ... ... 381/731 
4,834,701 5/1989 Masaki eem 600/28 


4,877,027 10/1989 Brunkan нн 128/420.5 


Primary Examiner—Reinhard J. Eisenzopf 
Assistant Examiner—Andrew Faile 


[57] ABSTRACT 


А silent communications system in which nonaural 
carriers, in the very low or very high audio frequency 
range or in the adjacent ultrasonic frequency spectrum, 
are amplitude or frequency modulated with the desired 
intelligence and propagated acoustically or vibration- 
ally, for inducement into the brain, typically through 
the use of loudspeakers, earphones or piezoelectric 
transducers. The modulated carriers may be transmitted 
directly in real time or may be conveniently recorded 
and stored on mechanical, magnetic or optical media for 
delayed or repeated transmission to the listener. 


3 Claims, 3 Drawing Sheets 


36 38 


OUTPUT 


BANDPASS 


FILTER 


39 


ЕТЕКООУКЕ 
OSCILLATOR 


14,500 Hz 


226 / 340 


238 / 570 


Sheet 1 of 3 5,159,703 


Oct. 27, 1992 


U.S. Patent 


L = 


a 


9t 


119110 


ЧОІУЛПаоИ 
AON3n0333 


EERE 
-іЧа 


"ЕТШЕ 
SSVdüNV8a 3019 11950 


GI vl ei 


239 / 570 


227 / 340 


239 / 569 


U.S. Patent Oct. 27, 1992 Sheet 2 of 3 5,159,703 


14,500 Hz 


FIG. 2 


FREQUENCY 


3anitlaWv 


240 / 569 228 / 340 240 / 570 


Sheet 3 of 3 5,159,703 


Oct. 27, 1992 


U.S. Patent 


65 


1414410 


ZH 00G'vl 


341114 
SSVdONVA 


8c 


9e 


83XIN 


ç ld 


(ZH» SSP) 
HO1VTII2SO 
ЕНЕГЕ 


ve 


0171190 
831113 озомупуа 


SẸ ec 


ЕЕ А 


HO33dS 


¿ç 


ДА 


241 / 570 


229 / 340 


241 / 569 


242 / 569 


5,139,703 


1 
SILENT SUBLIMINAL PRESENTATION SYSTEM 


BACKGROUND —FIELD OF THE INVENTION 


This invention relates in general to electronic audio 
signal processing and, in particular, to subliminal pre- 
sentation techniques. 


BACKGROUND—DESCRIPTION OF PRIOR 
ART 


Subliminal learning enjoys wide use today and sub- 
liminal tapes are being manufactured by a number of 
companies in the United States alone. Several decades 
of scientific study indicate that subliminal messages can 
influence а human’s attitudes and behavior. Subliminal, 
in these discussions, can be defined as “below the 
threshold of audibility to the conscious mind.” To be 
effective however, the subliminally transmitied infor- 
mation (called affirmations by those in the profession) 
must be presented to the listener’s ear in such a fashion 
that they can be perceived and “decoded” by the listen- 
er's subconscious mind. We are referring to audio infor- 
mation in this discussion, however, information could 
be inputted into the subject's subconscious mind 
through any of the body's sensors, such as touch, smell, 
sight or hearing. As an example, early development 
work in the subliminal field utilized motion pictures and 
slide projections as the medium. Early research into 
visual and auditory subliminal stimulation effects is 
exemplified by U.S. Pat. Nos. 3,060,795 of Corrigan, et 
al. and 3,278,676 of Becker. U.S. Pat. No. 4,395,600 of 
Lundy and Tyler is representative of later develop- 
ments in today’s subliminal message techniques. 

The majority of the audio subliminal tapes available 
today are prepared using one basic technique. That is, 
the verbal affirmations are mixed with, and recorded at 
a lower level than, a “foreground” of music or sounds 
of ocean surf or a bubbling mountain brook or other 
similar "masking" sounds. The affirmations are gener- 
ally recorded 5 decibels (db) or so below the “fore- 
ground” programming and regenerative automatic gain 
control is usually applied to permit the affirmations to 
change their recorded amplitude in direct proportion to 
the short term averaged amplitude of the continually 
varying “foreground” material. In other words, the 
volume of the affirmations will follow or track the vol- 
ume changes of the “foreground” programming, but at 
a lower volume level. Circuit provisions are also usually 
included to "gate" the affirmations off when the music 
amplitude is low or zero. This insures that the affirma- 
tions cannot be heard during quiet program periods. 
Thus, today's subliminal affirmations can be character- 
ized as being "masked" by music or other sounds, of 
constantly changing amplitude and of being reduced or 
cut off entirely during periods of low or quiet "fore- 
ground" programming. 

One of the principal, and most widely objected to, 
deficiencies in available subliminal tape presentation 
techniques is that the presence of the “foreground” 
material is intrusive to both the listener and to anyone 
else in the immediate area. No matter what "fore- 
ground" material is chosen, the fact remains that this 
material can be heard by anyone within its range and 
presents a definite distraction to other activities such as 
conversation, thought, desire to listen to other pro- 
gramming such as radio or television, need to сопсеп- 
trate, etc. Additionally, and because the tapes are used 
repeatedly by the same listener, any "foreground" 


10 


25 


30 


40 


45 


50 


55 


60 


65 


2 
music or material eventually becomes monotonously 
tiring to that listener. 

It is the purpose of the following described invention 
to eliminate or greatly reduce all of the above deficien- 
cies. Although its application to the magnetic tape me- 
dium is described in the following discussion, the tech- 
nique is equally applicable to most other desired trans- 
mission mediums, such as Compact Disc, videocas- 
settes, digital tape recorders, Public Address (PA) sys- 
tems, background music installations, computer soft- 
ware programs, random access memory (RAM), read 
only memory (КОМ), “live”, real time applications and 
other mediums now in existence or to be developed in 
the future. 

Implemented on tape cassettes, for example, the sub- 
liminal presentation described here is inaudible i.e., high 
audio or ultrasonic frequencies, the affirmations are 
presented at a constant, high amplitude level, and they 
occupy their own “clear channel", non-masked fre- 
quency allocations. If desired, the previously described 
"foreground" music or other material can be added to 
the tape through use of an audio mixer. The "silent" 
recordings are inaudible to the user or by others present 
and are therefore very effective for use during periods 
of sleep or when in the presence of others. Additionally, 
the basic requirements of subliminal stimulation are met. 
That is, the affirmations are efficiently transmitted to 
the ear and, while undetected by the conscious mind, 
are perceived by and efficiently decoded by the subcon- 
scious mind. 


OBJECTS OF THE INVENTION 


Accordingly, several objects and advantages of my 
invention are: 

(a) to provide a technique for producing a subliminal 
presentation which is inaudible to the listeners(s), yet is 
perceived and demodulated (decoded) by the саг for 
use by the subconscious mind. 

(b) to provide a technique for transmitting inaudible 
subliminal information to the Jistener(s) at a constant, 
high level of signal strength and on a clear band of 
frequencies. 

(c) to provide a technigue for producing inaudible 
subliminal presentations to which music or other "fore- 
ground" programming may be added, if desired. 

Stili further objects and advantages will become ap- 
parent from a consideration of the ensuing description 
and drawings. 


BRIEF DESCRIPTION OF THE DRAWINGS 


In the drawings, the first digit of each component 
number also refers to the figure number where that 
component can be located. 

FIG. 1 represents the block diagram of a suitable 
system which will generate a frequency modulated 
(FM) signal at 14,500 Hz. 

FIG. 2 represents an approximation of the frequency 
response curve of the human ear and the signal decod- 
ing process. 

FIG. 3 represents the block diagram of a suitable 
system which wil! generate a single sideband, sup- 
pressed carrier, amplitude modulated (AM) signal at 
14,500 Hz. 


REFERENCE NUMERALS IN DRAWINGS 


1i microphone or other 14 low distortion 


230 / 340 


242 / 570 


243 / 569 


5,189,703 


3 


-continued 
REFERENCE NUMERALS IN DRAWINGS 


audio input signal 

12 audio preamplifier 

if required 

13 frequency modulation 
circuil 

21 point on low freq end 
response curve between points 23 and 24 

22 point on low freq end 26 speaker output of FIG. 110 
of ear response curve ear 

23 point on high freq end 27 demodulated subliminal 

of ear response curve audio inputted to ear 

24 point on high freq end 31 microphone 

of ear response curve 
32 speech amplifier 


audio oscillator 

15 high pass or band 
pass audio filter 

16 output to tape 
recorder or other device 
25 midpoint on curve 


33 balanced modulator 


34 carrier oscillator 35 filter 
(455 KHz) 
36 mixer 37 heterodyne oscillator 


(469.5 KHz) 


38 bandpass filter 39 output signal 


DETAILED DESCRIPTION OF A PREFERRED 
EMBODIMENT 


Piease refer now to FIG. 1 and FIG. 2, which are 
drawings of a preferred implementation of the inven- 
поп. 

The principle of operation of the silent subliminal 
presentation system is as follows: 

An audio signal in the upper frequency region of the 
audio spectrum (for exampie, 14,500 Hz) is moduiated 
with the desired information. The type of modulation 
may be any type suitable for subliminal applications; 
frequency modulation (FM), phase modulation (PM), 
upper single sideband with suppressed carrier, ampli- 
tude modulation (AM), tone modulation, etc. 

For broadest application, the high audio frequency 
selected as the carrier frequency must meet two basic 
criteria: 

(1) be high enough in the audio spectrum that its 
presence to the human ear is essentially unnoticed or 
undetectable (without the listener being informed that 
the signal is actually present) and, 

(2) be low enough in the audio spectrum that it (and 
its modulation content) can produce a useful output 
power from home entertainment type cassette or reel- 
to-reel magnetic recorders. 

This would also include, of course, small portable and 
automobile tape decks. 

Alternatively, the output of the system can be fed 


directly into an audio amplifier and its speaker/ear- | 


phone system, Public Address system, etc. 

FIG. 1 provides the block diagram of an example of 
a system capable of generating the desired silent fre- 
quency modulated carrier. 

The modulation information is inputted into the mi- 
crophone 11. Other suitable input devices may be sub- 
stituted for microphone 11, such as a tape recorder or a 
radio. Тһе microphone 11 is connected to the preampli- 
fier 12 and should have provisions for adjusting its gain 


15 


20 


30 


35 


45 


55 


60 


in order that the optimum modulation index сап be set ` 
in the frequency modulator 13. The frequency modula- : 


tor 13 modulates the frequency of oscillator 14 which 
has been adjusted for an output of 14,500 Hz as de- 
scribed above. The output of oscillator 14 is fed through 
a suitable bandpass filter 15 into the tape recorder or 
directly into a suitable amplifier/speaker system. It is 
the purpose of the bandpass filter to remove or attenu- 


65 


4 
ate audible products of the modulation process in order 
to maintain as audibly silent an output as practical. 
On the receiving end, FIG. 2 represents an approxi- 


mate and idealized frequency response curve of the: 


human ear. The frequency modulated carrier (centered 
at 14,500 Hz), as generated above and played through a 
tape recorder or amplifier/speaker system, is shown on 
FIG. 2 as speaker output 26, impinging upon the upper 
slope of the ear's response curve at point 25. The fre- 
quency modulated excursions of the speaker output 26 
swing between points 23 and 24 on the ear's upper re- 
sponse curve. Because the response curve between 
points 23 and 25 is relatively linear, this action results in 
a relatively linear demodulation of the original modula- 
tion intelligence, which is passed on subliminally to the 
inner ear. The amplitude of the demodulated output is 
not high enough to be detected by the conscious mind 
but is sufficient in amplitude to be detected by the sub- 
conscious mind. In the field of communications engi- 
neering design, the above demodulation process in 
known as slope detection and was used in early FM 
receiver design. In those receivers, the response curve 
was formed by the action of a tuned (inductive/capaci- 
tance) circuit. In our case, the response curve is formed 
by the natural response curve of the human ear. The 
same slope detection technique can be performed at the 
low frequency end of the human ear response curve. 
This region is indicated on F1G. 2 as between points 21 
and 22. This region, however, has a much smaller avail- 
abie bandwidth and is therefore more restricted as to 
the amount of information that can be transmitted in ап 
inaudible manner. 

In practice, the listener adjusts the volume control of 
the tape recorder or amplifier to a level just below that 
at which the listener hears an audible sound or noise 
from the speaker of the tape recorder. If the recording 
process is properly done, a spectrum analyzer or a cali- 
brated sound level] meter wil! reveal a strong signal 
emanating from the tape recorder speaker. A calibrated 
sound level meter, at a distance of ] meter (with C 
weighting and referenced to the standard of 0.0002 
micro bar) wil} typically indicate a silent power output 
of from 60 to 70 decibeis. This is equivalent to the audio 
power of a loud conversation, yet, in the described 
system, is inaudible or unnoticed by the listener. 

FIG. 3 illustrates a system which generates a suitable 
amplitude modulated (AM) signal, instead of the fre- 
quency modulated (FM) system described above. The 
output is a modulated, single sideband (SSB), sup- 
pressed carrier (AM) signal at 14,500 Hz. 

The block diagram represents a common scheme for 
generating an SSB signal and will be briefly described. 

The desired sublimina! information is spoken into 
microphone 31. This signal is amplified by speech am- 
plifier 32 and injected into one port of balanced modula- 
tor 33. A continuous wave signal of 455 KHz is gener- 
ated by carrier oscillator 34 and is injected into the 
second port of balanced modulator 33. The output of 
balanced modulator 33 is a double sideband, suppressed 
carrier signal at 455 KHz. This signal is fed through 
filter 35, causing one of the two sidebands to be re- 
moved. This signal is fed into one port of mixer 36. A 
continuous wave signal at a frequency of 469.5 KHz 
from hetrodyne oscillator 37 is fed into the other port of 
mixer 36, resulting in an output of the original sublimi- 
nal audio information but translated 14,500 Hz higher in 
frequency. The bandpass filter 38 attenuates signals and 
noise outside of the frequencies of interest. The ampli- 


231 / 340 


243 / 570 


244 / 569 


5,159,703 


5 
tude modulated audio output signal is shown as output 
39. 

Thus, as stated earlier, my invention provides a new 

system for subliminal presentations which is: 

(a) silent, 

(b) outputs a constant, high level modulated signal and, 
(c) occupies a band of clear channel frequencies. 

Тһе foregoing description of the preferred embodi- 
ment of the invention has been presented for the pur- 
poses of illustration and description. It is not intended to 
be exhaustive or to limit the invention to the precise 
form disclosed. Many modifications and variations are 
possible in light of the above discussions. It is intended 
that the scope of the invention be limited not only by 
this detailed. description, but rather by the claims ap- 
pended hereto. 

What is claimed: 

1. A silent communications system, comprising: 

(a) amplitude modulated carrier means for generating 
signals located in non-aural portions of the audio 
and in the lower portion of the ultrasonic fre- 
quency spectrum said signals modulated with infor- 
mation to be perceived by a listener’s brain and, 

(b) acoustic and ultrasonic transducer means for 
propagating said signals, for inducement into the 
brain, of the listener, and, 


15 


20 


25 


30 


45 


50 


55 


65 


6 


(c) recording means for storing said modulated sig- 
nals on mechanical, magnetic and optical media for 
delayed or repeated transmissions to the listener. 

2. A silent communications system, comprising: 

(a) frequency modulated carrier means for generating 
signals located in non-aural portions of the audio 
and in the lower portion of the ultrasonic fre- 
quency spectrum, said signals modulated with in- 
formation to be perceived by a listener's brain, and; 

(b) acoustic and ultrasonic transducer means for 
propagating said signals, for inducement into the 
brain of the listener, and; 

(c) recording means for storing said modulated sig- 
nals on mechanical, magnetic and optical media for 
delayed or repeated transmissions to the listener. 

3. A silent communications system, comprising: 

(a) a combination of amplitude and frequency modu- 
lated carrier means for generating signals located in 
non-aural portions of the audio and in the lower 
portion of the ultrasonic frequency spectrum, said 
signals modulated with information to be perceived 
by a listener's brain, and 

(b) acoustic and ultrasonic transducer means for 
propagating said signals, for inducement into the 
brain of the listener; 

(c) recording means for storing said modulated sig- 
nals on mechanical, magnetic and optical media for 


delayed or repeated transmissions to the listener. 
ж + ж ж 


232 / 340 


244 /570 


PDF SECTION: 


UNITED STATES PATENTS. 


+ 


United States Patent пя пи Patent Number: 4,858,612 
Stocklin | 45) Date of Patent: Aug. 22, 1989 


[54] HEARING DEVICE OTHER PUBLICATIONS 


Gerkin, G., “Electroencephalography & Clinical Neu- 
rophysiology", vol. 135, No. 6, Dec. 1973, рр. 652-633. 
Frye et al, "Science", vol. 181, Jul 27, 1973, pp. 


[76] Inventor: Philip L. Stocklin, P.O. Box 2111, 
Satellite Beach, Fla. 32937 


| 356-358. 
[21] Appl. No.: 562,742 Bise, William, “Low Power Radio-Frequency and Mi- 
crowave Effects on Human Electroencephalogram and 
[22] Filed: Dec. 19, 1983 Behavior", Physiol. Chem. & Physics 10 (1978). 
Primary Examiner—William E. Kamm 
[51] int. Cle ....... ри В бр же вада рибка А6ІМ 1/36 Attorney, Agent, or Firm—Wegner & Bretschneider 
[52] U.S. Cl. em 128/422; 178/419 S [57] ABSTRACT 
[58] 128/419 R, 419 S, 422, А : PE 
128/653, 771, 732, 741, 746, 791, 804; 340/407 А method and apparatus for simulation of hearing in 
: mammals by introduction of a plurality of microwaves 
into the region of the auditory cortex is shown and 
[56] References Cited described. A microphone is used to transform sound 
U.S. PATENT DOCUMENTS : signals into electrical signals which are in turn analyzed 
3490458 1/1970 Allison 128/421 and processed to provide controls for generating a plu- 
3451605 8/1973 а 128/1 R rality of microwave signals at different frequencies. The 
3,951,134 4/1976 Malech ........ 777 туз] multifrequency microwaves are then applied to the 
4,428,277 1/1984 Zollner et al. 2. 128/419 в — brain in the region of the auditory cortex. By this 
method sounds are perceived by the mammal which are 
FOREIGN PATENT DOCUMENTS representative of the original: sound received by the 
893311 2/1972 Canada see 128/422 microphone. - 
2811120 9/1978 Fed. Rep. of Germany ... 128/419 К 
= 591196 1/1978 U.S.S.R, see 128/419 R 29 Claims, 7 Drawing Sheets 


MICROWAVE AMPLIFIER BANK 18 


OSCILLATOR 
| 


OSCILLATOR 
2 


OSCILLATOR 
N 


PN 


MICROWAVE RADIATION 
GENERATOR 


246 / 569 234 / 340 246 / 570 


Aug. 22, 1989 Sheet 1 of 7 4,858,612 


US. Patent 


bl ХУЙ 
1091802 
3008 
م مر‎ ЈСО ———— 

———W 

| NYE 

| 1 
N A2N300383 ` № 0 
1081009 NIV9 OL. Та NE 
№ 
NI 
i 

г <a 
| 26 
2 19N300334 Zb 
1081102 №У901 55 & 
21 
— р 
| 15 
| 438300334 lp 
1041802 Му9 01 it 


С | 
ТІСТІҢ 000 


| | 9143 


247 / 570 


235 / 340 


247 / 569 


US. Patent Aug. 22, 1989 Sheet 2 of 7 4,858,612 


F! 6. 2 | MICROWAVE AMPLIFIER BANK 18 


MICROWAVE RADIATION 
6E 


NERATOR 
50 FIG 20 
BROADBAND 
MICROWAVE 52 20 


SOURCE 


Lig 
ра 26 
= % 
" 
us — | 
FN VAM, 
PN 
Ug 


248 / 569 236 / 340 248 / 570 


US. Patent Aug. 22, 1989 Sheet 3 of 7 4,858,612 


FIG 5 


FROM ЕЕ 


FI6.4 


30! 
30 


FROMFI 


FIG 3 


Le 
= 
со 
се 
c 


249 / 569 237 / 340 | 249 / 570 


US. Patent ^ Aug. 22, 1989 Sheet 4 of 7 4,858,612 
FIG. 6 


64, 


г r _— 


MICROWAVE 
SOUND HEARING 
SOURCE GENERATOR WITH 


1 
1 
| 
| 
| 
| 
| 
| 
| 
I 
| 
і 
4 


\ AD Ta OP 66 HEADPHONE 

62 ле 
RF- SOUND 
SHIELDED 
ROOM 


FIG. 7 


VARIABLE 
0501 па 


72 VARIABLE 
V OSCILLATOR 
76 N 


250 / 569 238 / 340 250 / 570 


US. Patent Aug. 22, 1989 Sheet 5 of 7 4,858,612 


سے 
í |‏ 
x Е: FIG 9‏ 
г-0‏ 
ТЮ r = 41 —— | —~T01=-1‏ 
CS и‏ 


АА 
HERD - 
r = CONSTANT 5 LE È -CONSUNT 


Е г, AND Ø RELATED TO CARTESIAN 
COORDINATES x,y,z 


| d A oe 


2 


Но 10 


SECTION А-А 


TRANSFORMATION EQUATIONS 


| | 
х а ye (er ss 6 кіш 

| | 
y 04-1 UT [== 
t= adr 0< fS 21. 


251 / 569 239 / 340 


251/570 


252 / 569 


US. Patent Aug. 22, 1989 Sheet 6 of 7 4,858,612 


-MODE NUMBER 


Қ” i — ~, 22. ODE NUMBER 
/ | ( 
utu ` У, 3- MODE 
а wo Z: “ |; `Y NUMBER 
B \ y /; / Г 
ка \ 2 „г 
` Ñ р 
` Z gh 
| b s 27,4 
LE `~ 22: 22246 
85 СІЗ eee ЕВ 
LEFT bm ar 5.00 6 pent 
P P ud Ба ET 
2 / ` ` 
27 F4 \ `. 
Ж. Y 1 
f jw a + S: 
\ р 
N 
й `~- 27A 
с БКВ 


FIG 1 


TRANSVERSE ELECTRIC MODES 


F1G 12 


PRIMARY AUDITORY CORTEX 


р! 


240 / 340 


252 / 570 


US. Patent Aug. 22, 1989 Sheet 7 of 7 4,858,612 


5.259 
SOURCE 
LOCATIONS 


2,59 
e РА 


3 IUS EE 
Beh aset 
N 
50 t/s چم‎ 
2- 2T 


IüOc/s: auct B 


0с naL. 

400 c/s ae “ы, 

800 c/s е N 
rj 


l600c/s ,.-57 
0 0 20 30 
DISTANCE FROM 
STAPES, mm 


BASILAR MEMBRANE DISPLACEMENT 
QN COCHLEA 


RELATIVE AMPLITUDE 


RMS AMPLITUDE, TRANSVERSE ELECTRIC FIELD (RELATIVE UNITS) 


09 qo ANGLE д 30° 
MODAL PATTERNS ON Ai 


ЖАБ 


253 / 569 ` 241 / 340 253 / 570 


254 / 569 


4,858,612 


H 
HEARING DEVICE 


BACKGROUND OF THE INVENTION 


1. Field of the Invention 
This invention relates to devices for aiding of hearing 
in mammals. The invention is based upon the perception 


`of sounds which is experienced in the brain when the 


brain is subjected to certain microwave radiation sig- 
nals. 

2. Description of the Prior Art 

In prior art hearing devices for human beings, it is 
well known to amplify sounds to be heard and to apply 
the amplified sound signal to the ear of the person wear- 
ing the hearing aid. Hearing devices of this type are 
however limited to hearing disfunctions where there is 
no damage to the auditory nerve or to the auditory 
cortex. In the prior art, if there is damage to the audi- 
tory cortex or the auditory nerve, it cannot be corrected 
by the use of a hearing aid. 

During World War II, individuals in the radiation 
path of certain radar installations observed clicks and 
buzzing sounds in response to the microwave radiation. 
It was through this early observation that it became 
known to the art that microwaves could cause a direct 
perception of sound within a human brain. These buzz- 
ing or clicking sounds however were not meaningful, 
and were not perception of sounds which could other- 
wise be heard by the receiver. This type of microwave 
radiation was not representative of any intelligible 
sound to be perceived. In such radar installations, there 
was never a sound which was generated which resulted 
in subsequent generation of microwave signals repre- 
sentative of that sound. 

Since the early perception of buzzing and clicking, 
further research has been conducted into the micro- 
wave reaction of the brain. In an article entitled “Possi- 
ble Microwave Mechanisms of the Mammalian Ner- 
vous System" by Philip L. Stocklin and Brain F. Stoc- 
klin, published in the TIT Journal of Life Sciences, 
Tower International Technomedical Institute, Inc. P.O. 
Box 4594, Philadelphia, Pa. (1979) there is disclosed a 
hypothesis that the mammalian brain generates and uses 
electro magnetic waves in the lower microwave fre- 
quency region as an integral part of the functioning of 
the central and peripheral nervous systems. This analy- 
sis is based primarily upon the potential energy of a 
protein integral in the neural membrane. 

Їп ап article by W. Bise entitled "Low Power Radio- 
Frequency and Microwave Effects On Human Electro- 
encephalogram and Behavior”, Physiol. Chemistry: 
Phys. 10, 387 (1978), it is reported that there are signifi- 
cant effects upon the alert human EEG during radiation 
by low intensity CW microwave electromagnetic en- 
ergy. Bise observed significant repeatable EEG effects 
for a subject during radiation at specific microwave 
frequencies. 


SUMMARY OF THE INVENTION 


Results of theoretical analysis of the physics of brain 
tissue and the brain/skuli cavity, combined with experi- 
mentally-determined electromagnetic properties of 
mammalian brain tissue, indicate the physical necessity 
for the existence of electromagnetic standing waves, 
called modes in the living mammalian brain. The mode 
characteristics may be determined by two geometric 
properties of the brain; these are the cephalic index of 
the brain (its shape іп prolate spheroidal coordinates) 


10 


20 


25 


40 


45 


50 


55 


60 


65 


242 / 340 


2 

and the semifocal distance of the brain (a measure of its 
size). It was concluded that estimation of brain cephalic 
index and semifocal distance using external skull mea- 
surements on subjects permits estimation of the subjects 
characteristic mode frequencies, which in turn will 
permit a mode by mode treatment of the data to simu- 
late hearing. f 

This invention provides for sound perception by indi- 
viduals who have impaired hearing resulting from ëar 
damage, auditory nerve damage, and damage to the 
auditory cortex. This invention provides for simulation 
of microwave radiation which is normally produced by 
the auditory cortex. The simulated brain waves are 
introduced into the region of the auditory cortex and 
provide for perceived sounds on the part of the subject. 


BRIEF DESCRIPTION OF THE DRAWINGS 


FIG. 1 shows the acoustic filter bank and mode con- 
trol matrix portions of the hearing device of this inven- 


. tion. 


FIG. 2 shows the microwave generation and antenna 
portion of the hearing device of this invention. 

FIG. 3 shows a typical voltage divider network 
which may be used го provide mode partition. 

FIG. 4 shows another voltage divider device which 
may be used to provide mode partition. 

FIG. 5 shows a voltage divider to be used as a mode 
partition wherein each of the resistors is variable in 
order to provide adjustment of the voltage outputs. 

FiG. 6 shows a modified hearing device which in- 
cludes adjustable mode partitioning, and which is used 
to provide initial calibration of the hearing device. 

FIG. 7 shows à group of variable oscillators and 
variable gain controls which are used to determine 
hearing characteristics of a particular subject. 

FIG, 8 shows a top view of a human skull showing 
the lateral dimension. 

FIG. 9 shows the relationship of the prolate spherical 
coordinate system to the cartesian system. 
_ FIG. 10 shows a side view of a skull showing the 
medial plane of the head, section А—А, 

FIG. 11 shows a plot of the transverse electric field 
amplitude versus primary mode number M. 

FIG. 12 shows a left side view of the brain and audi- 
tory cortex. 

FIG. 13 shows the total modal field versus angle for 
source location. 


DETAILED DESCRIPTION OF THE 
PREFERRED EMBODIMENT 


This invention is based upon observations of the ` 


physical mechanism the mammalian brain uses to per- 
ceive acoustic vibrations, This observation is based in 
part upon neuro anatomical and other experimental 
evidence which relates to microwave brain stimulation 
and the perception of sounds. 

It is has been observed that monochromatic acoustic 
stimuli (acoustic tones, or single tones) of different tre- 
quencies uniquely stimulate different regions of the 
cochlea. It has also been observed that there is a corre- 
sponding one to one relationship between the frequency 
of a monochromatic acoustic stimulus and the region of 
the auditory cortex neurally stimulated by the cochlear 
nerve under the physiologically normal conditions 
(tonotopicity). 

It is has been observed that for an acoustic tone of a 
frequency which is at the lower end of the entire acous- 


c 


254 / 570 


255 / 569 


4,858,612 


3 


tical range perceivable by a person, that a thin lateral 
region (“Line”) parallel to the medial axis of the brain 
and toward the inferior portion of the primary auditory 
cortex is stimulated. For an acoustic tone whose fre- 
quency is toward the high end of the entire perceivable 
acoustic range, a thin lateral region parallel to the me- 
dial axis and toward the superior portion of the primary 
auditory cortex is stimulated. 

Neural stimulation results in the generation of a broad 
band of microwave photons by the change in rotational 
energy state of protons integral to the neuron mem- 
brane of the auditory cortex. The physical size and 
shape of the brain/skull cavity, together with the (semi- 
conductor) properties (conductivity and dielectric con- 
stant) of the brain tissue provide an electromagnetic 
resonant cavity. Specific single frequencies are con- 
structively reinforced so that a number of standing 
electromagnetic waves, each at its own single electro- 
magnetic frequency in the microwave frequency re- 
gion, are generated in the brain. Each such standing 
electromagnetic wave is called a characteristic mode of 
the brain/skull cavity. 

Analysis in terms of prolate spheroidal wave func- 
tions indicates that transverse electric field components 
of these modes have maxima in the region of the audi- 
tory cortex. This analysis further shows that transverse 
electric field possess a variation of amplitude with angle 
in the angular plane (along the vertical dimension of the 
auditory cortex) and that is dependent only upon the 
primary mode number. 

The anditory cortex in the normally functioning 
mammalian brain is a source of microwave modes. The 
auditory cortex generates these modes in accordance 
with the neural stimulation of the auditory cortex by the 
cochlear nerve. Mode weighting for any one acoustic 
tone stimulus is given by the amplitude of each mode 
along the line region of the auditory cortex which is 
neurally stimulated by that acoustic tone stimulus. A 
listing of mode weighting versus frequency of acoustic 
stimulus is called the mode matrix. 

Іп this invention, the functions of the ear, the coch- 
lear nerve, and the auditory cortex are simulated. Mi- 
crowaves simulating the mode matrix are inserted di- 
rectly into the region of the auditory cortex. By this 
insertion of simulated microwave modes, the normal 
operation of the entire natural hearing mechanism is 
simulated, 

Referring now to FIG. 1 and FIG. 2 there is shown 
an apparatus which provides for induced perception of 
sound into a mammalian brain. This hearing device 
includes a microphone 10 which receives sounds, an 
acoustic filter bank 12 which separates the signais from 
the microphone into component frequencies, and a 
mode control matrix 14 which generates the mode sig- 
nals which are used to control the intensity of micro- 
wave radiations which are injected into the skull cavity 
in the region of the auditory cortex. 

The acoustic filter bank 12 consists of a bank of 
acoustic filters Ft through Fk which span the audible 
acoustic spectrum. These filters may be built from stan- 
dard resistance, inductance, and capacitance compo- 
nents in accordance with well established practice. in 
the preferred embodiment there are 24 filters which 
correspond to the observed critical bandwidths of the 
human ear. In this preferred embodiment a typical list of 
filter parameters is given by Table 1 below: 


40 


50 


60 


65 


4 
TABLE I 
Filter No. Center Frequency (Hz) Bandwidth (Hz) 
1 50 less than 100 
2 150 100 
3 250 100 
4 350 100 
5 450 10 
6 570 120 
7 700 140 
8 840 130 
9 1,000 160 
10 1,170 190 
и 1,370 210 
12 1,600 240 
13 1,850 280 
14 2,150 320 
15 2,500 380 
16 2,900 450 
1? 3,400 550 
18 4000 700 
19 4,800 900 
20 5,800 1,100 
21 ç 7,000 1,200 
22 8,500 1,800 
23 10,500 2,500 
24 13,500 3,500 


Тһе rectifier outputs one through K are feed to К 
mode partition devices. The mode partitioning devices 
each have N outputs wherein N is the number of micro- 
wave oscillators used to generate the microwave radia- 
tion. The outputs 1 through N of each mode partition 
device is applied respectively to the inputs of each gain 
controlled amplifier of the microwave radiation genera- 
tor. The function of the mode control matrix 14 is the 
control of the microwave amplifiers in the microwave 
amplifier bank 18. in the preferred embodiment thus 
will be 24 outputs and 24 microwave frequency oscilla- 
tors. 

Connected to each microwave amplifier gain control 
line is a mode simulation device 16 which receives 
weighted mode signals from the mode partition devices 
14. Each mode simulation device consists of one 
through k lines and diodes 17 which are each connected 
to summing junction 19. The diodes 17 provide for 
isolation from one mode partition device to the next. 
The diodes 17 prevent signals from one mode partition 
device from returning to the other mode partition de- 
vices which are also connected to the same summing 
junction of the mode summation device 16. The diodes 
also serve a second function which is the rectification of 
the signals received from the acoustic filter bank by 
way of the mode partition devices. In this way each 
mode partition device output is rectified to produce a 
varying DC voltage with major frequency components 
of the order of 15 milliseconds or less. The voltage at 
the summation junction 19 is thus a slowly varying DC 
voltage. 

The example mode partition devices are shown in 
greater detail in FIGS. 3, 4, and 5. The mode partition 
devices are merely resistance networks which produce 
1 through N output voltages which are predetermined 
divisions of the input signal from the acoustic filter 
associated with the mode partition device. FIG. 3 
shows a mode partitioning device wherein several out- 
puts are associated with each series resistor 30. In the 
embodiment depicted in FIG. 4 there is an output asso- 
ciated with each series resistor only, and thus there are 
N series resistors, or the same number of series resistors 
as there are outputs. The values of the resistors in the 
mode partition resistor network are determined in ac- 


243 / 340 


255 / 570 


256 / 569 


4,858,612 


5 


cordance with the magnitudes of the frequency compo- 
nent from the acoustic filter bank 12 which is required 
at the summation point 19 or the gain control line for 
amplifiers 20. 

The microwave amplifier bank 18 consists of a plural- 
ity of microwave oscillators 1 through М each of which 
is connected to an amplifier 20. Since the amplifiers 20 
аге gain controlled by the signals at summation junction 
19, the magnitude of the microwave output is con- 
trolled by the mode control matrix outputs F1 through 
Е, In the preferred embodiment there are 24 amplifiers. 

The leads from the microwave oscillators 1 through 
N to tlie amplifiers 20 are shielded to prevent cross talk 
from one oscillator to the next, and to prevent stray 
signals from reaching the user of the hearing device. 
The output impedance of amplifiers 20 should be 1000 
ohms and this is indicated by resistor 21. The outputs of 
amplifiers 20 are all connected to а summing junction 
22. The summing junction 22 is connected to a summing 
impedance 23 which is approximately 50 ohms. The 
relatively high amplifier output impedance 21 as сош- 
pared to the relatively low summing impedance 23 
provides minimization of cross talk between the amplifi- 
ers. Since the amplitude of the microwave signal needed 
at the antenna 24 is relatively small, there is no need to 
match the antenna and summing junction impedances to 
the amplifier 20 output impedances. Efficiency of the 
amplifiers 20 is not critical. 

Level control of the signal at antenna 24 is controlled 
by pick off 25 which is connected to the summing impe- 
dance 23. In this manner, the signal at antenna 24 can be 
varied from 0 (ground) to a value which is acceptable to 
the individual. 

The antenna 24 is placed next to the subject’s head 
and in the region of the subject's auditory cortex 26. By 
placement of the antenna 24 in the region of the audi- 
tory cortex 26, the microwave field which is generated 
simulates the microwave field which would be gener- 
ated if the acoustic sounds were perceived with normal 
hearing and the auditory cortex was functioning nor- 
maliy. 

In FIG. 2A there is shown a second embodiment of 
the microwave radiation and generator portion of the 
hearing device. In this embodiment a broad band micro- 
wave source 50 generates microwave signals which are 
feed to filters 52 through 58 which select from the broad 
band radiation particular frequencies to be transmitted 
to the person. As in FIG. 2, the amplifiers 20 receive 
signals on lines 19 fzom the mode control matrix. The 
signals on lines 19 provide the gain control for amplifi- 
ers 20. | 

In FIG. 6 there is shown a modified microwave hear- 
ing generator 60 which includes a mode partition resis- 
tor divider network as depicted in FIG. 5. Each of the 
mode partition voltage divider networks in this embodi- 
ment are individually adjustable for all of the resistances 
in the resistance network. FIG. 5 depicts a voltage 
division system wherein adjustment of the voltage parti- 
tion resistors is provided for. — 

In FIG. 6, the sound source 62 generates audible 
sounds which are received by the microphone of the 
microwave hearing generator 60. In accordance with 
the operation described with respect to FIGS. 1 and 2, 
microwave signals are generated at the antenna 10 in 
accordance with the redistribution provided by the 
mode control matrix as set forth in FIG. 5. 

The sound source 62 also produces a signal on line 64 
which is received by a head phone 66. The apparatus 


15 


20 


25 


6 

depicted in FIG. 6 is used to calibrate or fit a micro- 
wave hearing generator to a particular individual. Once 
the hearing generator is adjusted to the particular indi- 
vidual by adjustment of the variable resistors in the 
adjustable mode partition portion of the hearing genera- 
tor, a second generator may be built using fixed value 
resistors in accordance with the adjusted values 
achieved in fitting the device to the particular subject. 
The sound produced by headphone 66 shouid be the 
same as a sound from the sound source 62 which is 
received by the microphone 10 in the microwave hear- 
ing generator 60. In this way, the subject can make 
comparisons between the perceived sound from the 
hearing generator 60, and the sound which is heard 
from headphone 66. Sound source 62 also produces a 
signal on 68 which is feed to cue light 69. Cue light 69 
comes on whenever a sound is emitted from sound 
source 62 to the microwave generator 60. іп this man- 
ner, if the subject hears nothing, he will still be informed 
that a sound has been omitted and hence that he is in- 
deed perceiving no sound from the microwave hearing 
generator 60. 

In FIG. 7 there is shown a modified microwave hear- 
ing generator which may be used to determine a sub- 
ject's microwave mode frequencies. In this device, the 
acoustic filter bank and the mode control matrix have 


‚ been removed and replaced by voltage level signal 


40 


45 


50 


60 


generated by potentiometers 70. Also included are a 
plurality of variable frequency oscillators 72 which feed 
microwave amplifiers 74 which are gain controlled 
from the signal generated by potentiometers 70 and pick 
off arm 76. 

This modified microwave hearing generator is used 
to provide signals using one oscillator at a time. When 
an oscillator is turned on, the frequency is varied about 
the estimated value until a maximurn acoustic percep- 
tion by the subject is perceived. This perception how- 
ever may consist of a buzzing or hissing sound rather 
than a tone because only one microwave frequency is 
being received. The first test of perception is to deter- 
mine the subject's lowest modal frequency for audition 
(M=1). Once this modal frequency is obtained, the 
process is repeated for several higher modal frequencies 
and continued until no maximum acoustic perception 
Occurs. 

Another method of determination of a subject's 
modal frequencies is through anatomical estimation. 
This procedure is by measurement of the subject’s ce- 
phalic index and the lateral dimensions of the skull. In 
this method, the shape is determined in prolate spheroi- 
dal coordinance. 

Purely anatomical estimation of subject’s modal fre- 
quencies is performed by first measuring the maximum 
Їаѓегаі dimension (breadth) L, FIG. 8, of the subject's 
head together with the maximum dimension D (anterior 
to posterior) in the medial plane of the subject’s head. D 
is the distance along Z axis as shown in FIG. 10. The 
ratio L/D, called in anthropology the cephalic index, is 
monotonically related to the boundary value Е defining 
the ellipsoidal surface approximating the interface be- 
tween the brain and the skull in the prolate spheroidal 
coordinate system. & defines the shape of this interface; 
Ë; and D together give an estimate of a, the semi-focal 
distance of the defining ellipsoid. Using & and a, to- 
gether with known values of the conductivity and di- 
electric constants of brain tissue, those wavelengths are 
found for which the radial component of the electric 
field satisfies the boundary condition that it is zero at ğo. 


244 / 340 


256 / 570 


257 / 569 


4,858,612 


7 
These wavelengths are the wavelengths associated with 
the standing waves or modes; the corresponding fre- 
quencies are found by dividing the phase velocity of 
microwaves in brain tissue by each of the wavelengths. 

A subject's microwave modal frequencies may also 
be determined by observing the effect of external micro- 
wave radiation upon the EEG. The frequency of the M 
equal 1 mode may then be used as a base point to esti- 
mate all other modal frequencies. 

A typical example of such an estimation is where the 
subject is laterally irradiated with a monochromatic 
microwave field simultaneous with EEG measurerment 
and the microwave frequency altered until a significant 
change occurs in the EEG, the lowest such frequency 
causing a significant EEG change is found. This is iden- 
tified as the frequency of the M—1 mode, the lowest 
mode of importance in anditory perception. The purely 
anatomical estimation procedure (FIGS. 8, 9, 10) is then 
performed and the ratio of each modal frequency to the 
M= 1 modal frequency obtained. These ratios together 
with the experimentally-determined M=1 frequency 
are then used to estimate the frequencies of the mode 
numbers higher than 1. The prolate spheroidal coordi- 
nate system is shown in FIG. 9. Along the lateral plane 
containing the x and y coordinates of FIG. 9, the pro- 
late spheroidal coordinate variable ф (angle) lies FIGS. 
9 and 10. Plots of the transverse electric field amplitude 
versus primary mode number m are shown in FIG. 11. 
The equation is 


EvransversAM, d) = E, sin(m p} " 


The “elevation view" FIG. 12, of the brain from the left 
side, shows the primary auditory cortex 10. The iso- 
tone lines and the high frequency region are toward the 
top of 100 and the low frequency region toward the 
bottom of 100. 

The formula I, set forth below is the formuia for 
combining modes from an iso-tone line at ф=ф} being 
excited to obtain the total modai field at some other 
angular location ф. For this formula, if we let J=1 (just 
one iso-tone single frequency acoustic stimulus line), 
then it can be shown that ALL modes (in general) must 
be used for any ONE tone. 


FORMULA I 


RMS TRANSVERSE ELECTRIC 
FIELD IN ANGULAR PLANE, ДО) 


2.4 
до) -[ и С і e 00—007 30 isin(mQj) ) | 
т-і j=l 


tn 


20 


25 


30 


35 


40 


45 


50 


8 
also as the source of frequency goes well above 30° (low 
frequency end). is plotted positive downward from 0° 
at lateral location as indicates in FIG. 11. 

Resistor weightings are obtained from the |sin 
(m[ó—ójD|, Formula I. The scale between acoustic 
frequency and must be set or estimated from experi- 
ment. Approximately 5.25 1° corresponds to а tonal 
stimulus at about 2 kHz (the most sensitive region of the 
ear) since this source location gives the highest electric 
field amplitude. 

The apparatus of FIG. 7 may also be used to deter- 
mine values for a hearing device which are required for 
a particular subject. Once the modal frequencies have 
been estimated, the device of FIG. 7 which includes 
variable microwave oscillators may be used to deter- 
mine values for the oscillators which match the subject, 
and to determine resistance values associated with the 
mode partition devices of the mode control matrix. 

In FIG. 7 manuai control of the amplifier gain is 
achieved by potentiometers 76. In this manner the arn- 
plifier gains are varied about the estimated settings for 
an acoustic tone stimulus in the region of two thousand 
Hertz (2 kHz) until maximum acoustic perception and a 
purest tone are achieved together. The term purest tone 
may also be described as the most pleasing acoustic 
perception by the subject. This process may be repeated 
at selected frequencies above and below 2 kHz. The 
selected frequencies correspond to regions of other 
acoustic filter center frequencies of the subject. When 
modal frequency (oscillator frequency) апа gain set 
values (setting a potentiometer 76) are noted, it is then 
possible to calculate fixed oscillator frequencies and 
control resistor values for the adjusted hearing device 
for this particular subject. 

In the event the subject has no prior acoustic experi- 
ence, that is deaf from birth, estimated resistor values 
must be used. Also, a compiex acoustic stimulation test 
including language articulation and pairs of harmoni- 
cally related tones may be developed to maximize the 
match of the hearing device parameters for those of this 
particular subject. 

"Typical components for use in this invention include 
commercially available high fidelity microphones 
which have a range of 50 Hz to 15 kHz with pius or 
minus 3 dB variation. 

The audio filters to be used with the acoustic filter 
bank 12 are constructed in a conventional manner, and 
have Q values of about 6. The filters may also be de- 
signed with 3 dB down points (4 the bandwidth away 
from the center frequency) occurring at adjacent center 
frequency locations. 

The diodes 17 in the mode control matrix which 
provide isolation between the mode partition circuits 


55 are commercially available diodes in the audio range. 
пари © ee асе сым The microwave oscillators 1 through N and the mi- 
E ATTENUATI 5 N LENGAH NANI әсет И лкен crowave amplifiers 20 are constructed with available 
m= PRIMARY MODE NUMBER (HIGHEST MODE M) microwave transistors which can be configured either 
as oscillators or amplifiers. Examples of the transistors 
FIG. 13 shows the resulting total modal field versus 60 are GaAsFET field effect transistors by Hewlitt Pack- 
angle ¢ for source location фа! 5.25°, 12.5", etc. With ага known as the НЕЕТ series or silicone bipolar tran- 
reference to the set of curves at the left top of this fig- sistors by Hewlitt Packard known as the HXTR series. 
ure. А spacing of approximately 7.25" in ф corresponds АП the cable between the oscillators, the microwave 
to a tonal difference of about 1 octave. This conclusion amplifiers, and the antenna should be constructed with 
is based on the side-lobes of pattern coming from 65 either singie or double shielded coaxial cable. 
ф=5.25°, etc. The total filed (value on y-axis) falls con- Тһе antenna 24 for directing microwave signals to 
siderably below the top curves for source locations weil the audio cortex 26 should be approximately the size of 
below 5.25“ (toward the high acoustic stimulus end) and the auditory cortex. A typical size would be one and 
245 / 340 


257 / 570 


258 / 569 


4, 858, 612 


9 
one half CM high and one haif to one CM wide. The 
antenna as shown is located over the left auditory cor- 
tex, but the right may also be used. Since the character- 


_istic impedance of the brain tissue at these microwave 


frequencies is close to 50 ohms, efficient transmission by 
commercially available standard 50 ohm coax is possi- 


‚ ble. 


The invention has been described in reference to the 
preferred embodiments. It is, however, to be under- 
stood that other advantages, features, and embodiments 
may be within the scope of this invention as defined in 
the appended claims. . 
What is claimed is: 
‚ 1. A sound perception device for providing induced 
perception of sound into a mammalian brain comprising 
in combination: | 
means for generating microwave radiation which is 
representative of a sound to be perceived, said 
means for generating including means for generat- 
ing a simultaneous plurality of microwave radia- 
tion frequencies and means for adjusting the ampli- 
tude of said microwave radiation frequencies in 
accordance with the sound to be perceived; and 

antenna means located in the region of the auditory 
cortex of said mammalian brain for transmitting 
said microwave energy into the auditory cortex 
region of said brain. 

2. A hearing device for perception of sounds compo: 
ing in combination: 

means for generating a signal representative of 

sounds; 

means for analyzing said signal representative of said 

sounds having an output; 

means for generating a plurality of microwave signals 

having different frequencies having a input con- 
nected to said output of said means for analyzing 
said signals, having an output; 

means for applying said plurality of microwave sig- 

nals to the head of a subject, and 

whereby the subject perceives sounds which are rep- 

resentative of said sounds. 

3. The apparatus in accordance with claim 2 wherein 
said means for generating a signal is a microphone for 
detecting sound waves. 

4. The apparatus in accordance with claim 2 wherein 
said means for applying said plurality of microwave 
signals is an antenna. 

5. The apparatus in accordance with claim 4 wherein 
said antenna is placed in the region of the auditory 
cortex of the subject. 

6. The apparatus in accordance with сізіт 2 wherein 
the subject is a human being. | 

7. The apparatus in accordance with claim 2 wherein 
said means for analyzing said signal comprises: 

an acoustic filter bank For dividing said sounds into a 

plurality of component frequencies; and | 

а mode control matrix means for providing control 

signals which are weighted in accordance with said 
piurality of component frequencies, having an out- 
put connected to said means for generating a plu- 
rality of microwave signal inputs. 

8. The apparatus in accordance with ciaim 7 wherein 
said acoustic filter bank includes a plurality of audio 
frequency filters. 

9. The apparatus in accordance with claim 8 wherein 
said audio frequency filters provide a plurality of output 
frequencies having amplitudes which are a function of 
said signal representative of sounds. 


246 / 340 


20 


25 


30 


40 


45 


50 


65 


10 


10. The apparatus in accordance with claim 9 
wherein said amplitudes are the weighted in accordance 
with transform function of the signal representative of 
sounds. 

11. The apparatus in accordance with claim 7 
wherein said mode control matrix device includes a 
voltage divider. connected to each of said plurality of 
said audio frequency filters. 

12. The apparatus in accordance with claim 11 
wherein each of said voltage dividers has a plurality of 
outputs which are connected in circuit to said means for 
generating a plurality of microwave signals. 


13. The apparatus in accordance with claim 2. 


wherein said means for generating a plurality of micro- 
wave signals comprises a plurality of microwave gener- 
ators each having a different frequency and means for 
controlling the output amplitude of each of said genera- 
tors. 

14. The apparatus in accordance with claims 2 
wherein said means for generating a plurality of micro- 
wave signals comprises a broad band microwave source 
2nd a plurality of filters. 

15. Тһе apparatus in accordance with claim 13 
wherein said generators each comprise a microwave 
signal source and a gain controlled microwave ampli- 
fier. | 

16. The apparatus in accordance with claim 13 
wherein said means for analyzing output is connected to 
said means for controlling microwave amplifier output 
amplitudes. 


17. The apparatus in accordance with claim 13. 


wherein analyzing includes К andio frequency filters. 

18. The apparatus in accordance. with claim 17 
wherein there are N microwave generators. 

19. The apparatus in accordance with claim 18 in- 
cluding a mode partitioning means which provides N 
outputs for each of said K audio frequency filters. 

20. The apparatus in accordance with claim 19 
wherein said N amplifiers each have K inputs from said 
mode partitioning means. 

21. The apparatus in accordance with claim 20 
wherein said N amplifiers have K inputs less the mode 
partitioning means outputs which are so small that they 
may be omitted. 

22. The apparatus in accordance with claim 20 
wherein said mode partitioning output device outputs 
each include a diode connected to each microwave 
amplifier gain control to provide isolation between all 
outputs. 

23. The apparatus in accordance with claim 20 
wherein said K audio frequency filters are chosen to 
correspond to the critical bandwidths of the human ear. 
. 24. The apparatus in accordance with claim 20 
wherein said N microwave generators are each adjust- 
able in frequency output. 

25. The apparatus in accordance with сізіп 18 
wherein the frequency of each N microwave generators 
is determined by anatomical estimation. 

26. Тһе apparatus in accordance with claim 18 
wherein the frequency of the lowest frequency micro- 
wave generator is chosen by determination of the effect 
of external microwave generation on the EEG of the 
subject. 

27. The apparatus in accordance with claim 18 


. wherein the frequency of each of said N microwave 


generators corresponds to the subject’s microwave 
modal frequencies. 


258 / 570 


259 / 569 


4,858,612 


11 
28. The apparatus in accordance with claim 27 
wherein the subject's modal frequencies are determined 
by measurement of the subject's cephalic index and the 
lateral dimensions of the skull. 
29. The apparaius in accordance with claim 28 
wherein the subject's lowest modal frequency is deter- 


10 


20 


25 


30 


35 


45 


50 


55 


60 


65 


12 
mined by varying the frequency of the lowest frequency 
microwave generator about the estimated value until a 
maximum acoustic perception is obtained by the sub- 


ject. 
Ж ж ж * + 


247 / 340 


259 / 570 


PDF SECTION: 


UNITED STATES PATENTS. 


551 / 569 


United States Patent па 
Lundy et al. | 


[11] 4,395,600 
[45] Jul. 26, 1983 


[54] AUDITORY SUBLIMINAL MESSAGE 
` ` SYSTEM AND METHOD . 
[76] Inventors: Rene В, Lundy, 3016 SE. 39th; David 


L. Tyler, 2939 SE. Taylor, both of 
Portland, Oreg. 97214 | 


[21] Appl No.: 210,645 


[22] Filed: . Nov. 26, 1980 

[5I] ШшЕС13................. Н04М 15/00; HO4K 1/02 

[52] U.S. CL aie ancien 179/1.5 M; 340/348 E; 
| 179/1 АА 

[58] Field of Search ................ 179/1 АА, ІР, 1.5 M; 


_ 340/348 E; 358/183, 22; 430/9; 178/17.5; 
| . 250/214 R; 352/130, 131, 201, 81 


[56] . References Cited 
U.S. PATENT DOCUMENTS 


625,627 5/1899 Woody ........4..24..0..а..Д.... 333/81 

711,440 10/1902 Relchenbach 352/201 
1,356,223 10/1920 . 332/55 
2,073,370 3/1937 5 . I78/17.5 
2,338,551 1/1944 ————— 179/1 P 
2,409,058 10/1946 . 79/1 P 
2,501,327 3/1950 . 179/1 P 


2,609,294 9/1952 e 430/9 
2,706,218 4/1955 „ 352/131 
2,730,565 1/1956 „ 358/183 
2,784,246 3/1957 .. 358/183 
2,788,986 4/1957 174/153 R 
2,808,455 10/1957 en 358/22 
2,809,298 10/1957 250/214 R 


2,931,857 4/1960 Hammond, Jr. et al. .......... 352/130 
2,941,044 6/1960 es 179/1 P 
2,969,428 1/1961 .. 179/7.1 R 
3,060,795 10/1962 igan et al. .................... 352/131 
3,173,136: 3/1965 ^ 340/384 E 
3,278,676 10/1966 . 358/142 
3,410,958 11/1968 . 179/1 P 
3,579,233 5/1971 .. 340/384 Е 
3,934,084 1/1976 m e. 179/1 P 
3,934,085 1/1976 Munson et al. ... ... 179/1 P 
4,052,720 10/1977 McGregor et al. ees 179/1 P 
4,059,726 11/1977 Watters et al. ....  179/1.5 M 
4,061,874 12/1977 Fricke еі al. ...................... 179/1 A 


OTHER PUBLICATIONS 
Brit. Journal of Psychology, (1979), 254-258; Mykel et 


al, Emergence of Unreported Stimuli in Imagery as a 
Function of Laterality . . . . 

Perceptual and Motor Skill, pp. 375-378, (1974), Zen- 
hausern et al., "Differential Effect of Subliminal . . . ". 
Proc. of 1978 IEEE, Region 3 СопЕ, 4/10-12/78, At- 
lanta, Becker et al., “Subliminal Communication: . . . ". 
Applications of Subliminal Video and Audio Stimuli in 
. . . Commercial Settings, 3/28/80, Becker et al. 

The Living Brain, W. Grey Walter, W. ХУ. Norton and 
Co., 1953, pp. 83-113. 

The Human Brain, John Pfeiffer, Harper Bros., 1955, 
pp- 156-161. | . 
Strobe-The Lively Light, Howard Luray, Camera 
Craft Publishing, 1949, pp. 11-15. 

"Electronic Magic", H. W. Secor, Radio Electronics, 
Jun. 1949, pp. 20-22. 

"TV Video Switching", John Brush, Television Eng., 
Jul. 1951, pp. 12-15, 29. 

"Fighting the Five Finger Discount", American Way, 
American Airlines, 11/80, pp. 72 et seq. 

“Application of Signal Detection Theory to Subliminal 
and Supraliminal Accessory Stimulation”, Zwosta and 
Zenhausern, Perceptual and Motor Skills, 1969, pp. 
699-704. 


Primary Examiner—Sal Cangialosi 
Attorney, Agent, or Firm—Klarquist, Sparkman, 
Campbell, Leigh, Whinston & Dellett 


[57] ABSTRACT 


Ambient audio signals from the customer shopping area 
within a store are sensed and fed to a signal processing 
circuit that produces a control signal which varies with 
variations in the amplitude of the sensed audio signals. 
A control circuit adjusts the amplitude of an auditory 
subliminal anti-shoplifting message to increase with 
increasing amplitudes of sensed audio signals and de- 
crease with decreasing amplitudes of sensed audio sig- 
nals. This amplitude controlled subliminal message may 
be mixed with background music and transmitted to the 
shopping area. To reduce distortion of the subliminal 
message, its amplitude is controlled to increase at a first 
rate slower than the rate of increase of the amplitude of 
ambient audio signals from the area. Also, the amplitude 
of the subliminal message is controlled to decrease at a 
second rate faster than the first rate with decreasing 


^ 249/340 


261 / 570 


262 / 569 


4,395,600 


Page 2 
ee 


"ambient audio signal amplitudes to minimize the possi- message to provide a composite signal fed to, and con- 


bility of the subliminal message becoming supraliminal trolled by, the control circuit. 
upon rapid declines in ambient audio signal amplitudes 


` in the area. A masking signal is provided with an ampli- 
tude which is also controlled in response to the ampli- 
‘tude of sensed ambient audio signals. This masking 


signal may be combined with the auditory subliminal 29 Claims, 5 Drawing Figures 


250 / 340 


262 /570 


Sheet 1 of 2 4,395,600 


Jul. 26, 1983 


U.S. Patent 


сә 
P 
9 
9 
#914 ge 
324105 
ONY WN9IS 9NDISVW 
ыз dW ONY 39VSS3W 
IWNIWITENS 
| почо 
ие омеумалу | 
JOVIIOA о 
ETA || Á Re ee i 
омо 1081 


| bbz -A bemti ` 


1412812 
H3ZIS3H.LNAS 
3910A 


339503534 
зам. 


п 


4119812 наз Талу 


омаунз 9NIOVH3AV 
TYNSIS SON LIT WY 


1109812 
НЕЕ 
-3Hd 


ламмуно OlGnv 


1112813 
1ум915 
SNDISVIN 


1412090 
43141 LOAY 


LIND 

313 AV 
9377041409 
397130۸ 


002 + vec 


есе 
102519 9NISS390Hd 17УМ916 Oldnv lIN3ISWV А 


почо 
ча зпайу 


Lin NO2 92 
62 | низы: = ope ЁЁ 52 09| 
i-e жән | E | 


1ум918 


- ПЧ 
43141 1238 ualdrTdWvadd 


"3NNVH2 ООПТ 


324005 'VNO9IS 


ампочехоув ve зі 


— ------- —— = —————— qƏYsÓ@ س‎ 
—— mm — ы 


4,395,600 


Sheet 2 of 2 


U.S. Patent Jul. 26, 1983 


и 5 m k dian ылы | X J| КЕЙ 1 
T | “| | | | < үзі | | "S p 
Е Е A Es goce [ow | “1. 
E o» wel + ЕРЕН pore м | 
тИ se nd |1 
a PT | سم‎ | ua | | А Di | | PS d 
vel ` | 
ро یی ا‎ x Le | Cate 
62/ IE t [x auo "ti 
x T = = 
ا کے ا‎ р T 
ЕД ST eT ae 
ET [> 21 همل‎ MEE o| 
wa O apu ӨЗ” _ 
PE Е 99 Г. Е ЕС A+ | 
| +. E. | | net | EZ En | 
| ا9ہ‎ 
sors اة‎ A الا‎ ТЕН? 
[| -- لص | لسا‎ 


264 / 570 


252 / 340 


264 / 569 


4,395,600 


1 


AUDITORY SUBLIMINAL MESSAGE SYSTEM 
AND METHOD 


BACKGROUND OF THE INVENTION 


The present invention relates to a system and method 
for providing subliminal auditory signals to an area such 
as a customer shopping area within a store. More partic- 
ularly, the invention relates to such a system and 


method in which the amplitude of the subliminal signal 


is adjusted in response to the amplitude of ambient 
audio signals from the customer shopping area. 

It has been established that auditory subliminal sig- 
nals, that is, those presented below the conscious recog- 
nition level of the listener, сап be used to influence the 
listener's behavior to some degree. Some early research 
into visual and auditory subliminal stimulation effects 
are exemplified in U.S. Pat. Nos. 3,060,795 of Corrigan, 
et al. and 3,278,676 of Becker. . 

In addition, Becker is understood to have experi- 


‘mented with the use of auditory subliminal messages to 


deter shoplifting by retail store customers. Although 


applicants have not seen or studied Mr. Becker's device, 


it is believed to.combine an auditory subliminal message 
with background music. However, during non-peak 
shopping and other times when the store area is excep- 
tionally quiet, the background music signal component 
in Becker must be much louder than the subliminal 
signal as otherwise the subliminal signal would be at a 
level such that it may be consciously recognized by a 
listener. In addition, as a result of this large difference 
between the amplitude of the background music and 
that of the subliminal message signal, the effectiveness 
of the Becker subliminal message is reduced. Also, 
Becker is understood to maintain his combined back- 
ground music and subliminal message at a level suffi- 
ciently high enough to enable the music to be heard 
even under noisy store conditions. However, when the 
ambient audio signal level drops, such as during non- 
peak store traffic times, the combined background 
music and subliminal signai would remain the same and 
seem overly loud. Thus, Becker is simply not under- 


stood to control the amplitude of a subliminal message 


in response to ambient audio signals from an area. 
Accordingly, there is a need for an auditory sublimi- 
nal message system and method which solves these and 


' other problems. 


SUMMARY OF THE INVENTION 


The present invention is a method and system for 
adjusting the amplitude of an auditory subliminal mes- 
sage in response to the amplitude of ambient audio sig- 
nals from an area to which the subliminal message is to 
be transmitted. In accordance with one aspect of the 


' invention, an audio signal processing circuit means re- 
'ceives signals representing the amplitude of audio sig- 


nals іп the area, such as a retail shopping area of a store. 
This processing circuit means produces a contro] signal 
for an amplitude adjustment or control circuit means 
which adjusts the amplitude or volume of an auditory 
subliminal signal which is to be transmitted to the area. 


- The amplitude of the auditory subliminal signal is ad- 


justed to increase with increasing sensed ambient audio 
signals and decrease with decreasing sensed ambient 


‘audio signals. · - | 


As a more specific aspect of the invention, a masking 
signal is generated and fed to the area. This masking 
signal has frequency. and amplitude characteristics 


253 / 340 


5 


15 


20 


25 


30 


35 


40 


45 


50 


55 


60 


65 


2 


which cover or render the subliminal signal inpercepti- 
ble to the conscious recognition level of a listener. In 
the preferred embodiment, the amplitude of this mask- 
ing signal is also controlled in response to the sensed 
ambient audio signals so that its amplitude follows the 
amplitude of the adjusted subliminal message signal. 
The masking signal may be combined with the sublimi- 
nal signal to provide a composite signal having an am- 
plitude controlled by the control circuit in response to 
the contro! signal. 

As a more specific feature of the invention, to reduce 
distortion of the subliminal message signal, the process- 
ing circuit means produces a control signal which 
causes the control circuit means to increase the ampli- 
tude of the auditory subliminal message signal slowly at 
a rate slower than the rate of change of the ambient 
audio signals at times when the ambient audio signals 
are increasing in magnitude. In addition, at times when 
the ambient audio signals are decreasing to minimize the 
possibility of conscious perception of the subliminal 
message signal, the processing circuit means produces a 
control signal which causes the control circuit means to 
decrease the amplitude of the subliminal signal at a fast 
rate. 

It is accordingly one object of the invention to pro- 
vide an improved auditory subliminal message system 
and method. 

Another object of the invention is to provide an audi- 
tory subliminal message having an amplitude which is 
adjusted in response to ambient noise levels within an 
area to which the auditory subliminal message is to be 
transmitted. 

A further object of the invention is to provide а 
method and system which adjusts the amplitude of an 
auditory subliminal message at one rate with increasing 
ambient audio signal levels in the area and at another, 
faster rate with decreasing ambient audio signal levels. 

A still further object of the invention is to provide 
such a method and system in which the amplitude of an 
auditory subliminal signal is adjusted to rise at a rate 
slower than the rate of increases in ambient audio signal 
levels. : 

Another object of the invention is to provide an audi- 
tory subliminal message which is continuously main- 
tained below the conscious perception level. 

A further object of the invention is to provide an 
auditory subliminal message which is maintained below 
the conscious perception level of listeners in an area and 
which is adjusted in response to ambient audio signals in 
the area so as to remain close to the level of conscious 
perception. 

Still another object of the invention is to provide au 
auditory masking signal for an auditory subliminal mes- 
sage, the masking signal having an amplitude which is 
adjusted in response to ambient noise levels in an area to 
which the auditory subliminal message is to be transmit- 
ted. 

A more specific object of the invention is to provide 
an auditory subliminal message anti-shoplifting system 
and method. 

These and other objects, features and advantages of 
the invention will become apparent with reference to 
the following drawings and description. 


265 / 570 


266 / 569 


4,395,600 


3 
BRIEF DESCRIPTION OF THE DRAWING 
In the drawing 
FIG. 1 is a block diagram of an auditory subliminal 


message system in accordance with the present inven- - 


tion; 

FIG. 2 is a block diagram illustrating one embodi- 
ment of an auditory subliminal message signal and 
masking signal source; 

FIG. 3 is a block diagram showing another embodi- 
ment of an auditory subliminal message signal and 
masking signal source; 

FIG. 4 is a block diagram showing an alternate ambi- 
ent audio signal processing circuit; and 

FIG. 5 is a detailed circuit schematic diagram of the 
ambient audio signal processing circuit and other por- 
tious of the circuit of FIG. 1. 


DETAILED DESCRIPTION 
Genera} Description of Preferred Embodiment 


It has now been discovered that in an environment 
with constantly changing ambient audio levels, such as 
in the shopping area of a store, it is desirable to adjust 
the amplitude of an auditory subliminal message signal 
to follow the amplitude of the ambient audio signals. 
That is, by increasing the amplitude of the auditory 
subliminal message with increasing ambient audio levels 
and decreasing the amplitude of the subliminal signal 
with decreasing ambient audio levels, the subconscious 
perception of the subliminal message by listeners is 
improved. This in turn increases the effectiveness of the 
subliminal message. 

Therefore, with reference to FIG. 1, the system in- 
cludes circuit means for controlling the amplitude of an 
auditory subliminal message signal in response to the 
level of ambient sounds in an area 26, such as the cus- 
tomer shopping area within a store, to which the sub- 
limina! message signal is to be transmitted. Such circuit 
means includes an ambient audio signal processing сіг- 
cuit 10 and a contro! circuit 12. Control circuit 12 is 
adapted to receive an auditory subliminal message sig- 
nal input at 14 and processing circuit 10 has at least one 
input 16 for receiving signals representing the amplitude 
or volume of ambient audio signals within the area. 
Processing circuit 10 and control circuit 12 adjust the 
amplitude of the auditory sublimina] message signal 
received at input 14, in response to the amplitude of 
ambient audio signals received at input 16, to produce 
an auditory subliminal message signal output at 18 hav- 
ing an amplitude which varies with variations in the 
level of ambient audio signals in the area. 

'The output signal at 18 is fed to an output circuit 
which, in the illustrated form, includes an output mixer 
circuit 20 having an input coupled to output 18, a pre- 
amplifier and amplifier circuit 22 with an input 21 cou- 
pled to the output of mixer circuit 20, and a speaker 24 
for transmitting the amplitude adjusted auditory sublim- 
inal message signal to area 26. The circuit also may 
include an optional background auditory signal source 
28 which produces music or other background auditory 
signals which are fed to an input 29 of the output mixer 
circuit 20. These background signals are combined 
within mixer circuit 20 with the amplitude controlled 
subliminal message signal and the combined signal is 
transmitted by speaker 24 to room 26. 

The preferred embodiment of the system also in- 
cludes at least one audio sensor means, such as micro- 
phone 30 positioned within the area 26. Microphone 30 


15 


220 


25 


35 


40 


45 


55 


60 


65 


4 


detects ambient audio signals within the area and pro- 
duces an electrical output signal representing these 
detected signals. The microphone output is fed to input 
16 of ambient audio signal processing circuit 10. 

Processing circuit 10 includes an audio channel 32 
associated with microphone 30 for modifying the input 
16 to produce an audio channel output signal at 34 
which varies with variations in the ambient andio signal 
input at 16, as explained below. Preferably, plural mi- 
crophones 30, 30а, 305, 30с, 30d, etc. are provided for 
detecting ambient audio signals in various parts of the 
area 26. For convenience, these microphones may be 
positioned in the ceiling of the shopping area. А гезрес- 
tive audio channel 32а, 320, 32c and 32d is associated 
with each of the microphones 30a, 305, 30c and 304 and 
produces output signals 34а, 34b, 34c and 34d in the 
same manner as the audio channel 32. The output sig- 
nals 34 are averaged by an averaging circuit 36 to pro- 
duce an output control signal at 38 which varies with 
variations in the amplitude of ambient audio signals 
sensed by the microphones throughout the store area 
26. E . 

In the embodiment of FIG. 1, each audio channel 32 
includes a preamplifier circuit 40 for amplifying the 
input signal 16, a rectifier circuit 42 for rectifying the 
amplified input signal and a signal shaping circuit 44 for 


modifying the rectified ambient audio signal input from 


microphone 30, as explained below. 

In connection with this signal shaping circuit, 3t has 
now been discovered that rapid changes of an ampli- 
tude of an auditory subliminal signal can distort it to 
such an extent that it becomes unrecognizable to sub- 
conscious perception. Hence, to reduce such distortion 
and increase the subconscious perceptibility of the sub- 
liminal signal, the signal shaping circuit adjusts the 
control signal to cause the amplitude of the auditory 
subliminal message signal at a rate which is slower than 
the rate of increase of ambient audio signals at times 
when the amplitude of such ambient signals is increas- 
ing. However, with sudden drops in the level of ambient 
audio signals, a slow drop in the amplitude of the sub- 
liminal message could lead to conscious perception of 
this message. This can be extremely disadvantageous in 
situations wherein it is desired to keep the existence of 
the subliminal message a secret. Therefore, the signal 
shaping circuit adjusts the control signal to cause the 
volume of the auditory subliminal message to drop at a 
faster rate upon a decrease in the volume of ambient 
audio signals. 2” 

Hence, with this form of signal shaping circuit 44, the 
control signal output at 38 of the averaging circuit 36 
varies at one rate with increasing ambient audio signals 
and at another fester rate with decreasing ambient audio 
signals. Furthermore, control circuit 12 is responsive to 
this varying control signal to produce an amplitude 
adjusted auditory subliminal message output at 18 
which increases at a first rate with increases in ambient 
audio signals and decreases at a second rate, faster than 
the first rate, with decreases in ambient audio signals. In 
addition, to prevent distortion of the subliminal mes- 
sage, the first rate is slower than the rate of increase of 
the ambient audio signals. 

It has also now been discovered that time lags are 
introduced into an auditory subliminal system. Such 
time lags are primarily due to the amount of time re- 
quired by ambient audio signals is travel to microphones 
and the time required by an amplitude controlled sub- 


254 / 340 


266 / 570 


267 / 569 


4,395,600 


5 
liminal message to travel from speakers to a listener. 
Thus, no matter how quickly the. system reduces the 
amplitude of the. ‘auditory . subliminal message in re- 
sponse to declining ambient sound. levels, a reduction in 


the amplitude of the subliminal message would lag the 


réduction in volume of ambient sound. Thus, а rapid . 


drop in ambient sound level could momentarily leave 
the subliminal message signal at a level sufficiently high 
to be perceived by a listener. In certain applications this 
would prove extremely disadvantageous. ` 


For example, if ап anti-shoplifting subliminal system ` 


is used to deter shoplifting in a store, customers may be 
extremely reluctant tó patronize the store if they con- 
sciously perceive a normally anti-shoplifting message 


: and hence realize that such a system is in use. Thus, 


although a store may realize savings due to a reduction 
in shoplifting, its overall profits may suffer because of 
customer reluctance to patronize a store wherein such a 
system is in use. Hence, in such applications it is desir- 
able to maintain. the subliminal signal continuously 


. below the conscious perception range of listeners. On 


the other hand, in other applications such as in connec- 
tion with a weight loss class in which the listeners real- 
ize that an auditory subliminal weight loss message is 


* being transmitted, it is not as critical to continuously 
maintain the subliminal message below: conscious рег- 


ception levels. 

To solve this problem, the preferred бедері of 
the system includes means for producing a masking 
signal which screens the auditory subliminal message 
and blocks its conscious perception, particularly during 
times when the volume of ambient noise drops quickly. 
Thus, as illustrated in FIG. 1, the system includes a 
subliminal message and masking signal source means 48 
which produces the auditory subliminal message signal 
fed to input 14 of control circuit 12. In addition, source 
48 includes means for providing a masking signal with 
amplitude and frequency characteristics which block 
conscious perception of the auditory subliminal mes- 
sage. The masking signal may bypass control circuit 12 
and be fed directly to room 26. However, it is preferable 
that the amplitude of the masking signal also be con- 


. ‘trolled in response to the amplitude of ambient audio 


signals. Otherwise, when the room becomes very quiet, 
the masking signal could be во loud that it is readily 
perceived and annoying. Also, if the. masking signal 
amplitude remained constant while the subliminal signal 
amplitude dropped in response to drops in ambient 
sound levels; the amplitude of the masking signal would 
become so large relative to that of the subliminal mes- 
sage, that subconscious perception of the Subliminal 
message is impaired. 

Although a separate control circuit may be provided 
for controlling the amplitude of the masking signals, 
preferably the masking signal is combined with the 
auditory subliminal message signal and the resulting 
composite signal i is fed to input 14 of control circuit 12. 
As illustrated in FIG. 1, control circuit 12 тау include 
à voltage control amplifier circuit 39 for adjusting the 
output 18 in response to the control signal input 38. 

As shown in FIG. 2, subliminal message and masking 
signal source 48 may comprise a means such as a tape 
recorder for playing back a recording of a composite 
auditory subliminal message and masking signal. In an 
alternate form illustrated in FIG. 3, the subliminal mes- 
sage and masking signal source 48 may comprise a voice 
synthesizer circuit 50 which produces an auditory sub- 
Нпупаї component of. the composite subliminal and 


10 


6 
masking signals. One suitable voice synthesizer circuit 
50 comprises a commercially available “Digitalker” kit 
produced by National Semiconductor Company. This 
kit includes a sixteen kilobite, eight bit memory chip 
No. ММ52116 and a speech processor chip designated 
SPC. In addition, a masking signal circuit 52 is provided 
for producing the masking signal. This circuit may take 
various forms and comprise a white noise signal genera- 
tor circuit such as a random noise oscillator with an 
internal shift register. One suitable generator is available 


. from Radio Shack and designated random events gener- 


15 


20 


25 


ator chip No. S2688/MM5837. The masking signal cir- 
cuit and voice synthesizer circuit outputs are fed to а 
commercially available mixer amplifier circuit 54, in 
which they are combined. The mixer circuit output 
comprises the composite auditory signal which is fed to 
input 14 of the control circuit 12. 

As previously mentioned, the masking signal has 
frequency and amplitude components which make the 
auditory subliminal message signal incapable of con- 
scious recognition by a listener. More specifically, the 
masking signal has frequency components which over- 
lay the frequency components of the auditory sublimi- 
nal message signal. In addition; the amplitude of the 
masking signal is slightly higher than the amplitude of 
the auditory subliminal message signal. More specifi- 
cally, it has now been discovered that preferred results 


. are obtained when the amplitude of the masking signal 


30 


35 


is continuously maintained approximately within the 
range of 3 db to 15 db above the amplitude of the sub- 


` liminal message signal. Furthermore, that the best re- 


sults occur when the masking signal is approximately 5 


` db above the amplitude of the auditory subliminal mes- 


sage signal. That is, with such relative amplitudes of the 
masking signal to the auditory subliminal message sig- 
nal, a temporary screen is provided for the subliminal 


- message at times, such as during rapid declines in ambi- 


40 


45 


55 


65 


ent noise levels, when the subliminal message may oth- 
erwise become supraliminal. Also, with such relative 
amplitudes, the masking signal provides a satisfactory 
screen for the subliminal message without impairing 
satisfactory subconscious perception of the auditory 
subliminal message. It should be noted that with such 
relative amplitudes of the masking signal and subliminal 
message signal, the masking signal typically may not 
block conscious perception of the subliminal signal іп а 
situation where the composite subliminal message and 
masking signal are at a high amplitude in relation to the 
volume of ambient audio signals. However, such condi- 
tions are prevented by controlling the amplitude of the 
composite signal in response to ambient audio signals, as 
explained above. 

FIG. 4 illustrates an alternate ambient audio signal 
processing circuit. Components of this circuit which are 
similar to those of the FIG. 1 form of processing circuit 
have numbers incremented by two hundred over the 
corresponding numbers in FIG. 1. Hence, these compo- 
nents will not be described in detail. Unlike the FIG. 1 
form of processing circuit, the audio channels of the 
FIG. 4 embodiment do not include the signal shaping 
circuit. Instead, the output of the respective rectifier 
circuits are averaged by an averaging circuit 236 prior 
to signal shaping by a signal shaping circuit 244 in the 
manner explained above. 


DETAILED CIRCUIT DESCRIPTION 


With reference to FIG. 5, a four-channel audio signa! 
processing circuit is illustrated. Since each of the illus- 


255 / 340 


267 / 570 


268 / 569 


4,395,600 


trated channels is identical, only the upper channel will 
be described in detail. 

The audio channel includes series connected pream- 
plifier circuit 40, rectifier circuit 42, and signal shaping 
circuit 44, The три! 16 to the channel is obtained from 
the microphone 30 (FIG. 1) and thus fluctuates in re- 
sponse to changes ín ambient audio signals detected by 
the microphone. Input 16 and hence the microphone 
output is fed to preamplifier circnit 40. More specifi- 
cally, this input is coupled by a 0.1 microfarad capacitor 
58 through a one kilohm gain establishing resistor 60 to 
the inverting input of an operational amplifier 62. The 
output of amplifier 62 is connected through a one meg- 
ohm feedback resistor 64 to its inverting input. The gain 
of amplifier 62 is established by the ratio of resistors 64 
and 60 and, with these particular resistors is set at ap- 
proximately one thousand. Also, a positive biasing volt- 
age V 1s fed through 2 two megohm biasing resistor 66 
to the noninverting input of amplifier 62. With the cir- 
cuit components utilized in the FIG. 5 circuit, the posi- 
tive biasing voltage is six volts and a negative biasing 
voltage is at negative six volts. One suitable amplifier 62 
comprises one amplifier section of an LM3900 quad 
Norton operational amplifier. When connected as de- 
scribed above, amplifier 62 inverts and amplifies the 
input signal at 16. 

To convert the mput at 16 to a direct current signal, 
0.1 microfarad capacitor 68 couples the output of ampli- 
fier 62 to the inverting input of an amplifier 70 con- 
nected as an amplifying, inverting, precision rectifier. 
Rectifier circuit 42 produces an output signal compris- 
ing a positive half-cycle inverted and amplified version 
of the input signal. More specifically, the output of 
amplifier 70 is connected to the anode of a diode 74 
having its cathode connected through a one megohm 
feedback resistor 76 to the inverting input of amplifier 
70. Thus, the positive half-cycles of the output signal 
from amplifier 70 are coupled through diode 74 and 
resistor 76 to the inverting input of amplifier 70, In 
contrast, the negative half-cycle output signals from 
amplifier 70 are blocked by diode 74. However, because 
the output of amplifier 70 is connected to the cathode of 
a diode 72 having its anode coupled to the inverting 
input of amplifier 70, these negative going half cycles 
are coupled through diode 72 to the inverting input of 
amplifier 70. The output of rectifier 42 is taken at the 
cathode of diode 74 and comprises a positive represen- 
tation of the input signal 16 and hence of the amplitude 
of ambient audio signals detected by microphone 30. A. 
suitable amplifier for accomplishing this rectification 
comprises one amplifier section of a type 324 quad oper- 
ational amplifier. 

The rectified output signal from rectifier circuit 42 is 
fed to signal shaping circuit 44. That is, the output of the 
rectifier circuit is fed to a resistor-capacitor network. 
This network comprises a ten kilohm resistor 78 cou- 
pled between the output of rectifier 42 and the nonin- 
verting input of an operational amplifier 80, a one mi- 
crofarad capacitor 88 which couples the noninverting 
input of amplifier 80 to ground, and а one hundred 
kilohm resistor 86 in parallel with capacitor 88. This 
network has a charging time constant of approximately 
0.01 seconds and discharging time constant of approxi- 
mately 0.1 seconds. Amplifier 80 may comprise one 
amplifier section of a type 324 quad operational ampli- 
fier and has its output coupled directly through a feed- 
back loop to its noninverting input so that the amplifier 
acts as a voltage follower. The output of amplifier 80 


5 


15 


20 


25 


30 


35 


40 


45 


50 


55 


65 


8 

drives another resistor-capacitor network including a 
five hundred kilohm resistor 82 and a ten microfarad 
capacitor 90. The time constant of this latter resistor- 
capacitor is approximately five seconds. Also, a diode 
84, having a turn-on voltage of approximately 0.7 volts, 
has its anode connected to the contact between resistor 
82 and capacitor 90 and its cathode connected to the 
noninverting input of amplifier 80. The positive side of 
capacitor 90 is coupled through a one hundred kilohm 
resistor 92 10 the output 34 of the audio channel. This 
output 34 is then fed to averaging circuit 36 as explained 
below. | : 

For reasons explained above, signal shaping circuit 44 
operates in the following manner to produce an output 
on line 34 which increases at one rate with increasing 
sensed ambient audio signals and which decreases at a 
rate faster than said one rate with decreases in the 
sensed audio signals. Furthermore, because of the de- 
lays within the signal shaping circuit 44 resulting from 
charging time of the resistor-capacitor networks, the 
output signal on line 34 will increase at a slower rate 
than the rate of increase of ambient noise signals, This 
slows the rate of change of the audio subliminal signal 
and thereby minimizes rapid amplitude fluctuations 
therein and resulting distortions. That is, as the ampli- 
tude of ambient audio signals increases, the signal reach- 
ing capacitor 90 also increases. However, because of the 
relatively long charging time constant of the resistor- 
capacitor network including capacitor 90, capacitor 90 
charges slowly. Hence, under those conditions the out- 
put on line 34 comprises a slowly rising DC signal. 
Furthermore, because the voltage at the anode of diode 
$4 is greater than or equal to the voltage at its cathode, 
diode 84 is nonconducting. In contrast, upon a sudden 
decrease in the amplitude of the sensed ambient audio 
signals, the input to operational amplifier 80 quickly 
decreases. As a result, the voltage at the cathode of 
diode 84 drops below the voltage at the anode of this 
diode sufficiently to cause the diode to conduct. While 
conducting, diode 84 establishes a short circuit between 
the positive side of capacitor 90, through resistor 86 and 
to ground so that capacitor 90 rapidly discharges. 
Therefore, the output signal at 34 drops rapidly and at 
a rate much faster than the rate at which the output 34 
rose with increases of the amplitude of the ambient 
audio signals. Of course, by adjusting the time constants 
of the resistor-capacitor circuits within shaping circuit 
44, the rate of change of the output 34 in response to 
changes in ambient audio signals can be adjusted as 
desired. 

The outputs of the audio channels are fed to averag- 
ing circuit 36. More specifically, resistor 92 and a simi- 
lar resistor in each of the other audio channels couple 
the DC outputs from these channels to the inverting 
input of an operational amplifier 94 connected to aver- 
age the signals received at its inverting input. Amplifier 
94 may comprise a type 741 operational amplifier. The 
noninverting input of this amplifier is grounded and a 
twenty-five kilohm feedback resistor 96 couples the 
output of amplifier 94 to its inverting input. In addition, 
a ten kilohm current limiting resistor 98 couples the 
output of amplifier 94, which comprises the control 
signal 38, to control circuit 12. More specifically, with 
this particular circuit, control signal 38 comprises a 
varying direct current signal. Resistor 96 is set at one- 
quarter the value of the input resistors 92 so that the 
gain of the averaging amplifier 94 is established at 0.25. 
In the event only one microphone is used to detect 


256 / 340 


268 / 570 


269 / 569 


4,395,600 


:9 
ambient audio signals, then averaging, of course, is not 
performed. 

Control circuit 12 controls the amplitude of the com- 
posite auditory subliminal message and masking signal 
received at its input 14 in response to the control signal 
on line 38 and thereby in response to changes in ambient 
sound levels within room 26. More specifically, the 
control signal on line 38 is used as a gain control for an 
amplifier 102 of circuit 39. Amplifier 102 may comrise a 
type CA3080A operational transconductance amplifier 
connected as a voltage controlled amplifier. The con- 
troi signal on line 38 is fed to the control signal input 
TABC of amplifier 102. Amplifier 102 is conducted in a 
conventional manner as a single supply operational 
amplifier. Also, the positive reference voltage is fed 
through a voltage divider network including a forty- 
seven kilohm resistor 106 and forty-seven kilohm resis- 
tor 110 to ground. The three-volt signal available from 
this divider is supplied to the noninverting input of 
amplifier 102. A ten microfarad capacitor 108 couples 
this latter input to ground to remove stray alternating 
current signals at this input. In addition, the composite 
subliminal auditory message signal and masking signal 1s 


fed to input 14 of voltage control amplifier circuit 39.. 


That is, these signals are coupled through a ten micro- 
farad capacitor 104 to the inverting input of amplifier 
102. The output of amplifier 102 is fed to one side of a 
ten kilohm potentiometer 112 having its other side cou- 
pled to ground through resistor 110. The output of 
circuit 39 is taken from potentiometer 112 and, as ex- 
plained above, comprises a composite auditory sublimi- 
nal message signal and masking signal having an ampli- 
tude adjusted in response to ambient audio signals 
within area 26. The wiper arm of potentiometer 112 also 


‘permits adjustment of the amplitude of the voltage con- 


trolled composite auditory subliminal signal and mask- 
ing signal. Hence, this amplitude can be selectively 
adjusted to make the masking signal component more 
clearly consciously perceptible to provide an indication 
that the system is operational. 

Тһе gain controlled output signal of circuit 39 is 
connected through a one hundred kilohm resistor 114 to 
the inverting input of an operational amplifier 116 
within output mixer circuit 20. Amplifier 116 may com- 
prise a type 741 operational amplifier connected as an 
inverting mixer. Any optional background audio sig- 
nals, such as music, may be fed to input 29 of output 


“mixer circuit 20. This input is coupled by a ten micro- 


farad coupling capacitor 124 in series with a one hun- 
dred kilohm input resistor 122 to the inverting input of 
amplifier 116. A one hundred kilohm feedback resistor 
is also coupled between the output of amplifier 116 and 
its inverting input. Since resistors 114, 118 and 122 are 
all equal, the gain of the amplifier 116 is established at 
one. The output of amplifier 116 is coupled through a 
ten microfarad coupling capacitor 120 to preamplifier 
and amplifier circuit 22 (FIG. 1) and heuce to the 


` speaker 24 located in the area 26. 


In a specific anti-shoplifting application, an auditory 


. subliminal message signal designed to encourage hon- 


esty is provided. One such signal comprises the phrase 
“Тат honest, Е will not steal". This auditory subliminal 
message signal is combined with a white noise masking 
signal to provide a composite signal input to the control 
circuit 12. The amplitude of this composite signal is then 


.' adjusted within control circuit 12, as explained above, 


in response to changes іп the amplitude of ambient 


-audio signals detected, within. the shopping area of а 


257 / 340 


— 


0 


20 


25 


30 


45 


55 


65 


10 


store. The amplitude controlled composite signal is then 
transmitted to the shopping area so that the subliminal 
message is subconsciously perceived by individuals 
within the store. 

It has now been experimentally determined that, al- 
though shoplifting and theft are not completely elimi- 
nated, significant reductions in these losses have re- 
sulted in such an application of the system of this inven- 
tion. 

Having illustrated and described the principles of our 
invention with reference to several preferred embodi- 
ments, it should be apparent to those persons skilled in 
the art that such embodiments may be modified in ar- 
rangement and detail without departing from such prin- 
ciples. We claim as our invention all such modifications 
as come within the true spirit and scope of the following 
claims. 

We claim: 

1. An auditory subliminal message system for an area 
comprising: 

ambient audio stgnal processing circuit means 

adapted to receive an input representing ambient 
audio signals in the area, said ambient signal pro- 
cessing means comprising means for producing a 
control signal output which continuously varies 
with variations in the received input and thereby 
with variations in the ambient audio signals in the 
area; and 

subliminal message control circuit means having a 

first input adapted to receive an auditory sublimi- 
nal message signal, said control circuit means hav- 
ing a second input coupled to said ambient signal 
processing means for receiving said control signal 
output, and said contro} circuit means comprising 
means for continuously adjusting the amplitude of 
the received auditory subliminal message signal 
and for producing an adjusted output signal com- 
prising the amplitude adjusted anditory subliminat 
message signal, the adjusted output signal being 
adapted for transmission to the area and having an 
amplitude which varies in response to said control 
signal so as to increase with increases in amplitude 
of ambient audio signals in the area and decrease 
with decreases in amplitude of ambient audio sig- 
nals in the area. | 

2. A system according to claim 1 in which said ambi- 
ent audio signal processing circuit means changes said 
control signal at one rate with increases in amplitude of 
ambient audio signals in the area and changes it at a 
faster rate with decreases in amplitude of ambient audio 
signals in the area, said control circuit means compris- 
ing means responsive to said control signal to produce 
an adjusted auditory subliminal message output signal 
which has an amplitude which increases at a first rate 
with increases in the amplitude of ambient audio signals 
in the area and which decreases at a second rate faster 
than the first rate with decreases in the amplitude of 
ambient audio signals in the area. 

3. An auditory subliminal message system for an area 
comprising: 

audio sensor means for sensing ambient audio signals 

in the area and for producing an ambient audio 
output signal representing the volume of the sensed 
ambient audio signals; 

means having an input coupled to the output of said 

audio sensor means for producing a subliminal 
message output signal with a volume which fol- 


269 / 570 


270 / 569 


4.395,600 


11 

lows the volume of the sensed ambient audio sig- 
nals in the area. 

4. A system according to claim 3 in which said last 

named means includes: 

subliminal message source means for providing an 
auditory subliminal message output signal; and 

volume control circuit means having an input cou- 
pled to the output of said audio sensor means and 
an input coupled to the output of said subliminal 
message source means, said volume control circuit 
means comprising means for adjusting the volume 
of the received subliminal message output signal in 
response to the received ambient audio output sig- 
nal so as to produce a modified subliminal message 
output signal which comprises the volume adjusted 
received subliminal message output signal. 


5. A system according to claim 3 in which said last 


named means comprises means for producing a sublimi- 
nal message output signal at a volume which increases 
in response to increases in the volume of sensed ambient 
audio signals at a rate slower than the rate of increase of 
the sensed ambient audio signals. 

6. A system according to claim 5 in which said last 
named means comprises means for producing a sublimi- 
па! message output signal at a volume which decreases 
in response to decreases in the volume of sensed ambi- 
ent audio signals at a rate which is faster than the rate 
the subliminal message output signal increases in re- 
sponse to increases in the volume of sensed ambient 
audio signals. 

7. An auditory subliminal message system for an area 
comprising: 

at least one audio sensor means for sensing ambient 

audio signals in the area and for producing an ambi- 
ent audio output signal representing the amplitude 
of the sensed ambient audio signals; 

subliminal message source means for providing an 

auditory subliminal message output signal; 

control circuit means coupled to the output of said 

audio sensor means and to said subliminal message 
Source means for adjusting the amplitude of the 
subliminal message output signal so as to follow the 
amplitude of the sensed ambient audio signals; and 
masking signal source means for providing and com- 
bining a masking signal having frequency charac- 
teristics and an amplitude such that when the mask- 
ing signal is combined with the amplitude adjusted 
subliminal message output signal it renders the 
adjusted subliminal message output signal outside 
of the conscious recognition range. . : 

8. A system according to claim 7 in which said sub- 
liminal message source means comprises means for pro- 
ducing a repetitive auditory subliminal message output 
signal. 

9. А system according to claim 7 in which said sub- 
limina] message source means and said masking signal 
source means comprise means for providing a compos- 
ite signal which includes the auditory subliminal mes- 
sage output signal as one component and which in- 
cludes the masking signal as another component; 

said control circuit means comprising means for ad- 

justing the amplitude of the composite signal so as 
to follow the amplitude of the sensed ambient audio 
signals. 

10. A system according to сізіп 9 including system 
testing means for selectively adjusting the amplitude of 
the composite signa} to bring the masking signal into the 


m" 


0 


— 


20 


сә 


5 


40 


45 


55 


65 


5 


12 


conscious recognition range and thereby indicate the 
system is operating. 

ll. A system according to claim 7 in which said 
masking signal source means provides a masking signal 
having an amplitude which is in the range of approxi- 
mately 3 db to 15 db greater than the amplitude of the 
amplitude adjusted subliminal message output signal. 

12. А system according to claim 11 in which said 
masking signal source means provides a masking signal 
having an amplitude which is approximately 5 db 
Breater than the amplitude of the amplitude adjusted 
subliminal message output signal. 

13. А system according to claim 7 іп which said 
masking signal source means comprises a white noise 
signal generator. | 

14. А system according to claim 9 in which said 
means for providing a composite signal comprises an 
audio recording playback means for playing back a 
recording of the composite signal. 

15. А system according to claim 9 in which said 
means for providing a composite signal includes voice 
synthesizer means for providing the auditory subliminal 
signal component. 

16. A system according to claim 15 in which said 
means for providing a composite signal includes white 
noise signal generator means for providing the masking 
signal component and mixer circuit means for combin- 
ing the ontput of said voice synthesizer means and the 
output of said white noise signal generator means to 
provide an output from said mixer circuit means which 
comprises the composite signal. 

17. A system according to claim 9 including output 
circuit means having at least one audio speaker means 
for transmitting the amplitude adjusted composite sig- 
nal to the area. 

18. A system according to claim 7 in which said con- 
trol circuit means is also coupled to said masking signal 
source means and comprises means for adjusting the 
amplitude of the masking signal so as to follow the 
amplitude of the sensed ambient audio signals. 

19. An auditory subliminal message system for an 
area comprising: 

at least one audio sensor means for sensing ambient 

audio signals in the area and for producing an ambi- 
ent audio output signal representing the amplitude 
of the sensed ambient audio signals; 
subliminal message source means for providing an 
auditory subliminal message output signal; 

masking signal source means for providing and com- 
bining a masking signal having frequency charac- 
teristics and an amplitude such that when the mask- 
ing signal is combined with the amplitude adjusted 
subliminal message output signal it renders the 
adjusted subliminal message output signal outside 
of the conscious recognition range; 

ambient audio signal processing circuit means cou- 

pled to the output of said audio sensor means for 
producing a control signal which varies with varia- 
tions in the amplitude of the sensed ambient audio 
signals; | 

amplitude control circuit means coupled to said sub- 

liminal message source means, to said masking 
signal source means and to said ambient audio sig- 
nal processing circuit means for controlling the 
amplitude of said auditory subliminal message and 
the amplitude of said masking signal in response to 
the control signal from said ambient audio signal 
processing circuit means such that the amplitudes 


258 / 340 


270 / 570 


271 / 569 


4,395,600 


13 
of said auditory subliminal signal and of said mask- 
ing signal increase with increasing amplitudes of 
the sensed ambient audio signals and decrease with 
decreasing amplitudes of the sensed ambient audio 
signals; and 

output circuit means including Speaker means for 

transmitting the amplitude controlled. auditory 
‘subliminal message output signal and the amplitude 
controlled masking signal to the area. 

20. A system according to claim 19 in which said 
ambient audio signal processing circuit means includes 
an audio channel circuit means associated with each 
said sensor means. ` | 

21. A system according to claim 20 including plural 
audio.sensor means and plural ‘audio channel means, 
each said audio channel means including rectifier circuit 


.means having an input coupled to the output of its asso- 
ciated audio sensor means for receiving and producing 


a rectified output signal representing the amplitude of 
the ambient audio signals sensed by the associated audio 


. Sensor means, each said audio channel means also in- 


cluding signal shaping circuit means having an input 


coupled to the output of said rectifier means for produc- 


ing a shaped output signal which increases at a first rate 


in response 10 increases in the rectified output signal 


which corresponds to increases in the amplitude of the 
ambient audio signals sensed by the associated audio 
sensor means, the shaped output signal decreasing at a 
second rate which is faster than the first rate in response 
to decreases in the rectified output signal which corre- 
sponds to decreases in the amplitude of the ambient 
audio signals sensed by the associated audio sensor 
means; and 

said system also including averaging circuit means 

having an input coupled to the outputs of said sig- 
nal shaping circuit means for receiving and averag- 
ing the shaped output signals to produce a control 
signal comprising the average of the received 
shaped output signals. 

22. A system according to claim 20 including plural 
audio sensor means and plural audio channel means, 
each said audio channel means including rectifier circuit 
means having an input coupled to the output of its asso- 
ciated audio sensor means for receiving and producing 
a rectified output signal representing the amplitude of 
the ambient audio signals sensed by the associated audio 
sensor means; 

said system also including averaging circuit means 

. having an input coupled to the outputs of said recti- 
fier circuit means for receiving and averaging the 
rectified output signals to produce an averaging 

` circuit output signal comprising the average of the 
received rectified output signals; and 

signal shaping circuit means having an input coupled 


14 

increases in the amplitude of the sensed ambient 
audio signals, the shaped output signal decreasing 
at a second rate which is faster than the first rate in 
response to decreases in the averaging circuit out- 
put signal which correspond to decreases in the 
amplitude of the sensed ambient audio signals. 

23. A system according to claim 21 or 22 in which the 


` first rate is slower than the rate of increase of the sensed 


- 


0 


20 


25 


30 


40 


45 


ambient audio signals. 

24. A system according to claim 19 in which said 
output circuit means includes means for combining 
background audio signals, such as music, with the am- 
plitude controlled auditory subliminal signal prior to 
transmitting this latter signal to the area. 

25. A system according to claim 21 in which the 
control signal comprises a control voltage and in which 
said amplitude contro] circuit means comprises a volt- 
age controlled amplifier circuit. 

26. A method of reducing shoplifting in a customer 
area of a store comprising: 

sensing ambient audio signals from the area; 

providing an auditory anti-shoplifting subliminal mes- 

sage signal; 

adjusting the amplitude of the subliminal message 

signal to follow the amplitude of the sensed audio 
` signals; and 

transmitting the amplitude adjusted subliminal mes- 

` sage signal to the area. 

27. A method according to claim 26 in which the step 
of adjusting the amplitude comprises the steps of in- 
creasing the amplitude at a first rate with increasing 
amplitudes of the sensed audio signals and decreasing 
the amplitude at a second rate faster than the first rate 
with decreasing amplitudes of the sensed audio signals. 

28. A method according to claim 26 or 27 including 
the steps of providing a masking signal having ampli- 
tude and frequency characteristics which when com- 
bined with the auditory subliminal message signal ren- 
ders the subliminal message signal below the level of 
conscious recognition; 

adjusting the amplitude of the masking signal to fol- 

low the amplitude of the sensed audio signals; and 
transmitting the amplitude adjusted masking signal to 
the area. 

29. A method according to claim 28 in which the step 
of providing a subliminal message signal comprises the 
step of providing a composite signal having the audi- 
tory subliminal message signal as one component and 
the masking signal as another component; 

the step of adjusting the amplitude comprises the step 

of adjusting the amplitude of the composite signal 
to follow the amplitude of the sensed audio signals; 
and 


to the output of said averaging circuit means for 55 (һе step of transmitting comprises the step of trans- 
producing a. shaped output signal which increases mitting the amplitude adjusted composite signal to 
at a first rate in response to increases in the averag- the area. 
ing circuit óutput signal which corresponds to к жж ж 
60 
65 
259 / 340 


271/570 


U NITED STATES PATENT AND TRADEMARK OFFICE 
CERTIFICATE OF CORRECTION 


PATENT NO. : 4,395,600 
DATED : July 26, 1983 
INVENTOR(S) : Rene R. Lundy and David L. Tyler 


И is certified that error appears in the above—identified patent and that said Letters Patent 
are hereby corrected as shown below: 


On the title page 
In the References Cited: 


"Relchenbach" should be --Reichenbach--. 


Column 4, line 67, "is" should be --to--. 


Column 9, line 9, "comrise" should be --comprise--. 


Signed and Sealed this 


Eighteenth Day of October 1983 
[SEAL] | 
Attest: 


GERALD J. MOSSINGHOFF 


Attesting Officer Commissioner of Patents and Trademarks 


U NITED STATES PATENT AND TRADEMARK OFFICE 
CERTIFICATE OF CORRECTION 


PATENT NO. : 4,395,600 
DATED : July 26, 1983 
INVENTOR(S) : Rene R. Lundy and David L. Tyler 


И is certified that error appears in the above—identified patent and that said Letters Patent 
are hereby corrected as shown below: 


On the title page 
In the References Cited: 


"Relchenbach" should be --Reichenbach--. 


Column 4, line 67, "is" should be --to--. 


Column 9, line 9, "comrise" should be --comprise--. 


Signed and Sealed this 


Eighteenth Day of October 1983 
[SEAL] | 
Attest: 


GERALD J. MOSSINGHOFF 


Attesting Officer Commissioner of Patents and Trademarks 


U NITED STATES PATENT AND TRADEMARK OFFICE 
CERTIFICATE OF CORRECTION 


PATENT NO. : 4,395,600 ` 
DATED : July 26, 1983 


INVENTOR(S) : Rene R. Lundy and David L. Tyler 


It is certified that error appears in the above- identified patent and that said Letters Patent 
are hereby corrected as shown below: | 

On the titie page 

In the References Cited; 


"Relchenbach" should be --Reichenbach--. 


Column 4, line 67, "is" should be --to--, 


Column 9, line 9, "comrise" should be --comprise--. 


Signed and Sealed this 


Eighteenth Day of October 1983 


[SEAL] 


Attest: 


GERALD J. MOSSINGHOFF 


Attesting Officer Commissioner of Patents and Trademarks 


PDF SECTION: 


UNITED STATES PATENTS. 


+ 


July 16, 1968 G. P. FLANAGAN 3,393,279 
NERVOUS SYSTEM EXCITATION DZVICE 
Filed March 13, 1962 | 2 Sheets-Sheet 1 


POWER SUPPLY 


FIG.. 


5 
RF POWER AUDIO SOURCE OF 
GENERATOR MODULATOR 


AUDIO SIGNAL 


` RF FREQUENCY 
CONTROL 


25 


FIG.4. 


INVENTOR 


276 / 569 264 / 340 276 / 570 


3,393,279 


G. P. FLANAGAN 


NERVOUS SYSTEM EXCITATION DEVICE 


July 16, 1968 


2 Sheets-Sheet š 


Filed March 13, 1962 


9l 


61---- 


E 3 


| x 
21 е 


"deaf 


ua3lduv2 д-ны 
GILYTINQOWN 
-з9п. лану 


e 


! 
| 
! 
! 
L. 


-------------|--------------------4 


س ست س س we nae pe‏ -=-~ 


VOOCOY 


v 
`6 


-- 


шы 


наннжо 4-8 


© 


| 


C e69l4 
possa | DOA SLE 
ог QIGNY 48 


е 


INVENTOR 


277 / 570 


265 / 340 


277 / 569 


278 / 569 


United States Patent Office 


3,393,279 
Patented July 16, 1968 


i 


3,393,270 
NERVOUS SYSTEM EXCITATION DEVICE 
Gillis Patrick Flanagan, Bellaire, Tex., assignor to Listen- 
ing Incorporated, Arlington, Mass. a corporation of 
Massachusetts 
Filed Mar. 13, 1962, Ser. No. 179,337 
3 Claims. (СІ. 179—107) 


This invention relates to electromagnetic excitation of 
the nervous system of a mammal and pertains more par- 
cularly to a method and apparatus for exciting the nervous 
system of a person with electromagnetic waves that are 
capable of causing that person to become conscious of in- 
formation conveyed by the electromagnetic waves. 

Tt is an object of the present invention to provide a 
means of initiating controllable responses of the neuro 
senses without applying ‘pressure waves or stress waves 
to the ears or bones. Another object of this invention is to 
provide a means of causing a person to receive an aural 


perception of the sound corresponding to the audio modu- : 


lation of radio frequency electromagnetic waves that are 
coupled with the nervous system of the person, These and 
other objects of this invention will be understood from 
the following drawings and description of the invention, 
wherein: 

FIGURE i is a schematic illustration of one form of 
the present nervous system excitation device. 

FIGURE 2 is a circuit diagram of one form of tbe 
present nervous system excitation device. 

FIGURE 3 is a diagrammatic view illustrating one form 
of field generator adapted to be used with the device of 
FIGURE 1. 

FIGURE 4 is a diagrammatic view illustrating another 
form of field gencrator adapted to be used with the 
device of FIGURE 1. 

The present invention involves the discovery that cer- 
tain electromagnetic waves induce responses in the nerv- 
ous systems of mammals, In human beings a response is 
produced when some or all of a person’s nervous system 
is placed within a field of electromagnetic waves having 
a radio frequency above the audible range. In additioa, 
when the nervous system of a person is contacted by 
modulated electromagnetic carrier waves of such a fre- 
quency, the nervous system is responsive to the modula- 
tion of the carrier waves. Each individual nervous system 
is at least somewhat selective in respect to the frequencies 
to which it is most responsive. A frequency to which tie 
nervous system of a person is demonstrably responsive can 
be determined by varying the frequency of carrier waves 
that are modulated by an information signal, such as 
speech or music, and measuring the frequency of such 
waves that produce the sensation of hearing the sounds 
corresponding to the modulating signal. 

In the method of the present invention, a response is 
initiated in the nervous system of a mammal by dis- 
posing at least a portion of that nervous system within 
a field of electromagnetic waves of a radio frequency 
above the aural range. In a preferred embodiment of 
thís invention, the field to which the nervous system is ex- 
posed is a field containing modulated electromagnetic 
waves of a particular radio frequency to which the indi- 
vidual nervous system is selectively responsive. In a par- 
ticularly preferred embodiment of this invention, at least 
a portion of the nervous system of a person is exposed to 
audio modulated electromagnetic waves having a radio 
fregnency such tbat the person experiences the sensation 
Of hearing, substantially free of distortion, the informa- 
tion which is conveyed by the audio modulation, 

Тһе present invention may be used as a hearing aid, as 


an aid to teaching speech to a person who was born deaf, 


as a means of communicating with persons in locations 


10 


80 


40 


20 


60 


2 


in which the noise level is hish, as а device by which a 
person сап listen to an audio signal that cannot be heard 
by others, etc. 

As shown in FIGURE 1 of the drawing, in a preferred 
form of the invention, a field of electromagnetic waves is 
generated by a field generating means, such as a pair of 
electrodes 1. The electrodes 1 are preferably electricaily 
insulated, for example by surrounding them with a suit- 
able electrical insulating material 2, and are arranged to 
generate a field coupled with at least a portion of the 
nervous system of a person, for example by being placed 
near or along opposite sides of a person's head. The 
electrodes 1 can be placed in direct contact with the skin 
and the electrodes can be placed on or near various por- 
tions of the body, such portions preferably being near the 
spinal cord. 

Тһе electrodes 1 are electrically connected to a source 
of modulated electromagnetic waves inclusive of a radio 
frequency power amplifier and variable frequency oscil- 
lator, indicated in box 3, an audio modulator, indicated in 
box 4, a source of audio signal, indicated in box 5, and а 
power supply for the signal source, modulator and am- 
plifier, indicated in box 6. The variable frequency oscil- 
lator 3 is preferably provided with a manual radio fre- 
quency control means, indicated by box За. Numerous 
forms of the components, indicated in boxes 3 to 6, that 
provide suitable power and a source of modulated electro- 
magnctic waves are presently known and the known de- 
vices can suitably be used as long as they are arranged to 
produce a relatively high voltage output that has а radio 
frequency above Ше audio range and is capable of being 
modulated by an audio signal or other signal adapted to 
be conveyed by the modulation of electromagnetic waves 
of such a frequency. 

The modulation can suitably be effected by means of 
either an amplitude or frequency modulation of such 
electromagnetic waves. These waves preferably have a 
frequency in the range of from about 20 kilocycles per 
second to about 200 kilocycles per second. The output of 
the source of modulated electromagnetic waves is prefer- 
ably at least about 1 watt where the field generator com- 
prises a pair of insulated electrodes placed on the head 
of a person. The extent to which a person is aurally per- 
ceptive to the output supplied at a given wattage is ma- 
terially increased when at least one of the electrodes is 
placed in electrical contact with the body of the person. 

In a preferred mode of operating the apparatus shown 
in FIGURE 1, the electrodes 1 are placed on the sides of 
the head of a person. The source 5 of audio signal is 
actuated to produce an audio signa! corresponding to 
sounds recognizable by that person, and source 3 of 
modulated electromagnetic waves is actuated to couple 
the waves with the nervous system of that person. When 
control ЗА is adjusted so that the frequency of the modu- 
lated waves is a frequency to which his nervous system is 
particularly responsive, the person to whom the field of 
such waves is applied has the sensation of hearing the 
sounds corresponding to the audio signal substantially 
free of distortion. 

In the circuit shown in FIGURE 2, a phase shift type 
of carrier oscillator, generally designated by dotted rec- 
tangle 7, with a frequency control. generalty designated 
by rectangle $8, is arranged to produce electromagnetic 
waves, shown at А, a frequency ranging from about 
20 to about 200 kilocycles per second. The oscillator out- 
put is coupled through capacitor 9 to a radio frequency 
power amplifier, generally designated by dotted rectangle 
10. Potentiometer 11, which is connectcd between capaci- 
tor 9 and ground, provides a means of adjusting the input 
То the amplifier, Switch 12, which is coanected to the 
cathode of tube 13 of the amplifier, provides a means 


266 / 340 


279 / 569 


3,393,279 


of switching between resistors 14 and 15 to vary the oper- 
ating power characteristics of the tube. 

The output of amplifier 10 is connected to transformer 
16 which is coupled back-to-back with transformer 17. 
This arrangement of transformers provides an Inductive 
load such that the amplifier yields a high voltage output 
and is isolated from other components of the circuit. Re- 
sistor 18 connected across Ше output side of transformer 
17 serves to reduce any dangerous voltage spikes which 
might be produced. The output side of transformer 17 
is connected to a suitable field generator, which may com- 
prise the electrodes 1 surrounded by insulating mate- 
rial 2. 

The output of amplifier 10 is ampltiude modulated by 
means of the modulator generally designated by dotted 
rectangle 19. А fluctuating clectrical signal B, ргейег- 
ably of audio frequency, is applied to the modulator by 
means of input jack 20 and transformer 21. The output 
of the modulator varies the screen voltage of tube 13 


of the amplifier so that the modulation envelope of the ; 


current oscillation C produced across the load of tube 13 
correspond to the fluctuating signal B applied to the 
moduator. | 

Potentiometer 22 is connected to the cathode of tube 
23 as the cathode resistor of tube 23. Potentiometer 22 
is preferably adjusted so that the plate current of tube 
13 is about half its normal maximum value. The fluctu- 
ating signal applied to modulator 19 is then adjusted to 
cause the plate current of tube 13 to vary between the 
maximum and minimum values so that a large current 
variation occurs іп the load 16 of tube 13. 

Тһе apparatus shown iu FIGURE 2 has been used to 
communicate speech and music to numerous persons in- 
cluding registered physicians. In these uses the electrodes 
1, in the form o£ circular disc covered by a plastic insula- 
tion 2, were placed against the sides of the heads of the 
persons. When the electromaguctic waves were adjusted 
to a frequency to which persons having normal hearing 
were selectively responsive, none of these persons per- 
ceived any sensations of hearing or experienced any dis- 
combort when no audio modulatiou was applied to the 
waves. When the waves were audio modulated with a 
speech or music signal, none of these persons experienced 
any discomfort, but they each had the sensation of listen- 
ing to the transmitted information and “hearing” it at 
least as clearly as they would hear such information from 
an audible transmitter. When the same apparatus was 
similarly employed on a person whose hearing had been 
damaged to an extent requiring a hearing aid to hear 
normal conversation, that person “heard” the audio sig- 
nal (with this hearing aid disconnected) and “heard” 
music with a better fidelity than that obtainable with his 
hearing aid. | 

FIGURE 3 shows an arrangement for mounting the 
field generating means in a position such that a portion 
of a person's nervous system may be moved into and 
out of coupling with the field at the will of the person. 
In this arrangement, electrodes 1 surrounded by insula- 
tion 2 are mounted in vertical alignment along the back 
of a seating device, such as chair 24. When a person is 
seated and leaning back in the chair, portions of his 
nervous system are brought into coupling relationship 
with the field produced by electrodes 1. 

FIGURE 4 shows an alternative arrangement of the 


‘field generating means. In this arrangement, inductive 


сой 25 is connected to the output of a suitable source 
of modulated electromagnetic waves and serves as a field 


10 


30 


35 


40 


50 


55 


60 


267 / 340 


4 
generating means which is adapted to be placed around 
the head of a person. 

It is to be understood that the above embodiments -and 
examples have been presented for descriptive purposes 
and that, within the scope of the appended claims, the 
invention may be practiced otherwise than specifically 
illustrated and described. | 

I claim: 

1. A method of transmitting audio information to the 
brain of a subject through the ncrvous system of the 
subject which method comprises, in combination, the steps 
of generating a radio frequency signal having a frequency 
in excess of Ше highest frequency of the audio informa- 
tion to be transmitted, modualting said radio frequency 
signal with the audio information to be transmitted, and 
applying said modulated radio frequency signal to a pair 
of insulated electrodes and placing both of said insulated 
electrode in physical contact with the skin of said sub- 
ject, the strength of said radio frequency electromagnetic 
field being high enough at the skin surface to cause the 
sensation of hearing the audio information modulated 
thereon in the brain of said subject and low enough so 
that said subject experiences no physical discomfort. 

2. The method of claim 1 wherein said modulated elec- 
tromagnetic field is coupled with a portion of the nervous 
system contained in the person’s spinal column. 

3. Apparatus for transmitting audio information to the 
brain of a subject through the nervous system of the sub- 
ject comprising, in combination, means for generating a 
radio frequency signal having a frequency greater than 
the maximum frequency of said audio information, means 
for modulating said radio frequency signal with the audio 
information to be transmitted, electrode means adapted 
to generate a localized radio frequency electromagnetic 
field thereabout when excited by a radio frequency signal, 
and means coupling said modulated radio frequency sig- 
nal to said electrode means, said electrode means hav- 
ing a surface adapted to be capacitively coupled to a 
localized area at the surface of the skin of said subject 
when placed in physical contact therewith whereby said 
electrode means may generate a localized radio frequency 
electromagnetic ficld modulated by said audio informa- 
tion at the surface of the skin of said subject, and means 
on said surface of said electrode means for insulating 
said electrode means from the skin of said subject. 


References Cited 
UNITED STATES PATENTS 


3,170,993 2/1965 Puharich ct а. ----- 179--107 
1,001,236 8/1911 Bachelet .-_..--------- 128—1.5 
1,120,964 12/1914 Neel --------------- 128—1.5 
2,004,751 6/1935 Fischer -------- 128—423 X 
2,103,440 12/1937 Weissenberg --------- 128—1.3 
2,118,594 5/1938 Dowden ---------- 128—1.5 X 
2,438,605 3/1948 Hart .-.-.-------- 128—1.5. X 
2,713,120 7/1955 Mostofsky .....-.. 128—423 X 
1,735,267 11/1929 Eichhorn ----------- 179—107 
2,995,633 8/1961  Puhdrich __ _. 179—107 


OTHER REFERENCES 
Rutschmann, pp. 22, 23, IRE Transactions оп Med. 
Electronics, March 1959, | 
KATHLEEN Н. CLAFFY, Primary Examiner. 
ROBERT H. ROSE, Examiner. . 
1. W. JOHNSON, A. A. MCGILL, Assistant Examiners. 


279 / 570 


PDF SECTION: 


UNITED STATES PATENTS. 


E 


281 / 569 


United States Patent по 
Malech 


ин 3,951,134 
[45] Apr. 20, 1976 


(54] APPARATUS AND METHOD FOR 
REMOTELY MONITORING AND 
ALTERING BRAIN WAVES 


[75] Inventor: Robert С. Malech, Plainview, N.Y. 


(731. Assignee: Dorne & Margolin Inc., Bohemia, 
N.Y. 


[22] Filed: Aug. 5, 1974 
[21] Appl. №.: 494,518 


[52] 128/2.1 B 
[51] Int. Chee ec AGIB 5/04 
[58] Field of Search ................. 128/1 C, 1 R, 2.1 B, 


128/2.1 R, 419 R, 422 R, 420, 404, 2 R, 2 S, 
2.05 R, 2.05 V, 2.05 F, 2.06 R; 340/248 A, 
258 A, 258 B, 258 D, 229 


3,555,529 1/1971 Brown et А|...................... 128/2.1 R 
3,773,049 11/1973 Rabichev et al. нн 128/1 С 
3,796,208 3/1974 — BiOICO octets teres 128/2 8 


Primary Examiner—William E. Kamm 
Attorney, Agent, or Firm—Darby & Darby 


[57] ABSTRACT 


Apparatus for and metbod of sensing brain waves at a 
position remote from a subject whereby electromag- 
netic signals of different frequencies are simulta- 
neously transmitted to the brain of the subject in 
which the signals interfere with one another to yield a 
waveform which is modulated by the subject’s brain 
waves. The interference waveform which is represen- 
tative of the brain wave activity is re-transmitted by 
the brain to a receiver where it is demodulated and 
amplified. The demodulated waveform is then dis- 


[56] References Cited played for visual viewing and routed to a computer for 
UNITED STATES PATENTS further processing and analysis. The demodulated. 
2,860,627 11/1958 Harden et ab ................... 128/2.1 В Waveform also can be used to produce a compensating 
3,096,768 7/1963 Griffith, 2.22.2... 128/420 Signal which is transmitted back to the brain to effect 
3,233,450 2/1966 Ету................ ess. 128/2.1 А a desired change in electrical activity therein, 
3,483,860 12/1969 Namerow..... сем. 128/2.05 Е . e 
3,495,596 2/1970 Сопана.............................. 1281 C 11 Claims, 2 Drawing Figures 
48 50а 58а 
T 46 PLOTTER 
е 50b 58b 
Ë 70 
Soc | 
2 % 
BAND pass [^7 2 | : 
FILTER е4 
62 AUXILIARY 
C 
30 34 с 
38 CIRCULATOR Ер 


45 10 


RE 
POWER 
DIVIDER 


39 


FREQUENCY 
DOUBLER 
36 


. 4l 


Би], 


269 / 340 


281 / 570 


3,951,134 


Sheet 1 of 2 


U.S. Patent April 20, 1976 


| USLLIWSNV YL 
АЯУІЛІХАУ 


(ногулпаон 
30193434 


59110319313 
VNN3.INV 


:81 


b VNN31NV 21 


JYALLINSNVYL 


| 914 


на: пайоо 


g3dana 


го 


КЕШЕН: 


AV 13S1g 


| 
| 
| 
| 
1 
| 
>| 
| 
t 
| 
І 
| 
| 
і 
| 
і 
| 


3,951,134 


26-4 uo1v1112s0 | 


283 / 570 


April 20, 1976 Sheet 2 of 2 


U.S. Patent 


9ç 
излапоа 
қ AON3ñn0334 
i 6€ 
— 2 yaaiald | 
C. Mod 80497111260 
Ol Sb У 
99 YOLVINIID ВЕ рс ос 
M31 HIASNYML 
Анугихпу 
v9 331114 
2p] 8598 ONYE 
ua3indwWoo 
оо ГЕЛІ? | ш 
915 GLS ?08 
OL 
mE E aonad 
406 
авс, | pt 
ма зол 9v 
asia | < 2 94 
DEG POS Gt 


271 / 340 


283 / 569 


284 / 569 


3,951,134 


i 


APPARATUS AND METHOD FOR REMOTELY 
MONITORING AND ALTERING BRAIN WAVES 


BACKGROUND OF THE INVENTION 


Medical science has found brain waves to be a useful 
barometer of organic functions. Measurements of elec- 
trical activity in the brain have been instrumental in 
détecting physical and psychic disorder, measuring 


stress, determining sleep patterns, and monitoring body: 


metabolism. 

The present art for measurement of brain waves em- 
ploys electroencephalographs including probes with 
sensors which arc attached to the skull of the subject 
under study at points proximate to the regions of the 
brain being monitored. Electrical contact between the 
sensors and apparatus employed to process thc de- 
tected brain waves is maintained by a plurality of wires 
extending from the sensors to the apparatus. The ne- 
cessity for physically attaching the measuring appara- 
tus to the subject imposes scveral limitations on the 
measurement process. The subject may experience 
discomfort, particulary if the measurements. are to be 
made over extended periods of time. His bodily move- 
ments are restricted and he is generally confined to the 
immediate vicinity of the measuring apparatus. Fur- 
thermore, measurements cannot be made while the 
subject is conscious without his awareness. The com- 
prehensiveness of the measurements is also limited 
since the finite number of probes employed to monitor 
local regions of brain wave activity do not permit ob- 
servation of the total brain wave profile i in a single test. 


SUMMARY OF THE INVENTION 


The present invention relates to apparatus and a 
method for monitoring brain waves wherein all compo- 
nents of the apparatus employed are remote from the 
test subject. More specifically, high frequency trans- 
mitters are operated to radiate electromagnetic energy 
of different frequencies through antennas which are 
capable of scanning thc entire brain of the test subject 
or any desired region thereof. The signals of different 
frequencies penetrate thc skull of the subject and im- 
pinge upon the brain where they mix to yield an inter- 
ference wave modulated by radiations from the brain's 
natural electrical activity. The modulated interference 
wave is re-transmitted by the brain and reccived by an 
antenna at a remote station where it is demodulated, 
and processed to provide a profile of the suject's brain 
waves. In addition to passively monitoring his brain 
waves, the subject's neurological processes may be 
affected by transmitting to his brain, through a trans- 
mitter, compensating signals. The latter signals can be 
derived from the received and processed brain waves. 


OBJECTS OF THE INVENTION 


It is therefore an object of the invention to remotely 
monitor electrical activity in the entire brain or se- 
lected local regions thereof with a single measurement. 

Another object is the monitoring of a subject's brain 
wave activity through transmission and reception of 
electromagnetic waves. 

Still another object is to monitor brain wave activity 
from a position remote from the subject. 

А further object is to provide a method and appara- 
tus for affecting brain wave activity by transmitting 
electromagnetic signals thereto. 


272 / 340 


10 


i5 


20 


25 


30 


35 


40 


45 


50 


55 


60 


65 


' tronic form is stored in buffer circuitry 22. From the 


2 
DESCRIPTION OF THE DRAWINGS 


Other ала further objects of the invention will appear 
from the following description and the accompanying 
drawings, which form part of the instant specification 
and which are to bc read in conjunction therewith, and 
in which like reference numerals arc uscd to indicate 
like parts in the various views; 

FIG. 1 is a block diagram showing the interconnec- 
tion of the components of the apparatus of the inven- 
tion; 

FIG. 2 is a block diagram showing signal flow in one 
embodiment of the apparatus. 


DESCRIPTION OF THE PREFERRED 
EMBODIMENT 


Referring to the drawings, specifically FIG. 1, a high 
frequency transmitter 2 produces and supplies two 
electromagnetic wave signals through suitable coupling 
means 14 to an antenna 4. The signals arc directed by 
the antenna 4 to the skull 6 of the subject 8 being exam- 
ined. Tbe two signals from the antenna 4, which travel 
independently, penetrate the skull 6 and impinge upon 
the tissue of the brain 10. 

Within the tissue of thc brain 10, the signals combine, 
much in the manner of a conventional mixing process 
technique, with each section of the brain having a dif- 
ferent modulating action. The resulting waveform of 
the two signals has its greatest amplitude when the two 
signals are in phase and thus rcinforcing one another. 
When the signals are exactly 180? out of phase the 
combination produces a resuitant waveform of mini- 
mum amplitude. If the amplitudes of the two signals 
transmitted to the subject are maintained at identical 
levels, the resultant interference wavcform, absent 
influences of external radiation, may be expected to 
assume zero intensity when maximum interference 
occurs, the nurober of such póints being equal to the 
difference in frequencies of the incident signals. How- 
ever, interfcrence by radiation from electrical activity 
within the brain 10 causes the waveform resulting from 
interference of the two transmitted signals to vary from 
the expected result, 1.е., the interference waveform is 
modulated by the brain waves. It is believed that this is 
due to the fact that brain waves produce electric 
charges each of which has a component of electromag- 
netic radiation associated with it. Thc electromagnetic 
radiation produced by the brain waves in turn reacts 
with the signals transmitted to the brain from the exter- 
nal source. 

Тһе modulated interference waveform is rc-transmit- 
ted from the brain 10, back through the skull 6. A 
quantity of energy is re-transmitted sufficient to enable 
it to be picked up by thc antenna 4. This can be con- 
trolled, within limits, by adjusting the absolute and 
relative intensities of the signals, originally transmitted 
to the brain. Of course, the lével of the transmitted 
energy should be kept below that which may be harm- 
ful to the subject. 

The antenna passes the received signal to a receiver 
12 through the antenna electronics 14. Within the ге- 
ссіуег the wave is amplified by conventional RF ampli- 
fiers 16 and demodulated by conventional detector and 
modulator electronics 18. The demodulated wave, rep- 
resenting the intra-brain electrical activity, is amplified 
by amplifiers 20 and the resulting information in elec- 


buffers 22 the information is fed to a suitable visual 


284 / 570 


285 


3,951,134 


3 
display 24, for example one employing a cathode ray 
tube, light emitting diodes, liquid crystals, or a mechan- 
ical plotter. The information may also be channeled to 
a computer 26 for further processing and analysis with 
the output of the computer displayed by herctofore 
mentioned suitable mcans. - 

In addition to channeling its information to display 
devices 24, the computer 26 can also produce signals to 
control an auxiliary transmitter 28. Transmitter 28 is 
used to producc a compensating signal which is trans- 
mitted to the brain 10 of the subject 8 by the antenna 
4. In а preferred embodiment of the invention, the 
compensating signal is derived as a function of the 
received brain wave signals, although it can be pro- 
duced separately. The compensating signals affect elec- 
trical activity within the brain 10. 

Various configurations of suitable apparatus and 
electronic circuitry may be utilized to form the system 
generally shown in FIG. 1 and onc of the many possible 
configurations is illustrated in FIG. 2. In the example 
shown therein, two signals, one of 100 MHz and thc 
other of 210 MHz are transmitted simultaneously and 
combine in the brain 10 to form a resultant wave of 
frequency equal to the difference in frequencies of the 
incident signals, i.e., 110 MHz. The sum of the two 
incident frequencies is also available, but is discarded 
in subsequent filtering. The 100 MHz signal is obtained 
at the output 37 of an RF power divider 34 into which 
а 100 MHz signal generated by an oscillator 30 is in- 
Jected. The oscillator 30 is of a conventional type em- 
ploying either crystals for fixed frequency circuits or a 
tunable circuit set to oscillate at 100 MHz. It can be a 
pulse generator, square wave generator or sinusoidal 
wave gencrator. The RF power divider can be any 
conventional VHF, UHF or SHF frequency range de- 
vice constructed to provide, at each of three outputs, a 
signal identical in frequency to that applied to its input. 

The 210 MHz signal is derived from the same 100 
MHz oscillator 30 and RF power divider 34 as the 100 
MHz signal, operating in concert with a frequency 
doubler 36 and 10 MHz oscillator 32. The frequency 
doubler can be any conventional device which provides 
at its output a signal with frequency equal to twice the 
frequency of a signal applied at its input. The 10 MHz 
oscillator can also be of conventional type similar to 
the 100 MHz oscillator herebefore described. А 100 
MHz signal from the output 39 of the RF power divider 
34 is fed througb the frequency doubler 36 and the 
resulting 200 MHz signal is applied to a mixer 40. The 
mixer 40 can be any conventional VHF, UHF or SHF 


frequency range device capable of accepting two input 


signals of differing frequencies and providing two out- 
put signals with freguencies equal to the sum and dif- 
ference in frequencies respectively of the input signals. 
А 10 MHz signal from the oscillator 32 is also applied 
to the mixer 40. The 200 MHz signal from the doubier 
36 and the 10 MHz signal from thc oscillator 32 com- 
bine in the mixer 40 to form a signal with a frequency 
of 210 MHz equal to the sum of the frequencics of the 
200 MHz and 10 MHz signals. 

The 210 MHz signal is one of the signals transmitted 
to the brain 10 of the subject being monitored. In the 
arrangement shown in FIG. 2, an antenna 41 is used to 
transmit the 210 MHz signal and another antenna 43 is 
used to transmit thc 100 MHz signal. Of course, a single 
antenna capable of operating at 100 MHz and 210 
MHz frequencies may be used to transmit both signals. 
The scan angle, direction and rate may be controlled 


10 


25 


30 


35 


40 


45 


50 


55 


60 


65 


4 
mechanically, e.g., by a reversing motor, or electroni- 
cally, e.g., by energizing elements in the antenna in 
proper synchronization. Thus, thc antenna(s) can be of 
either fixed or rotary conventional typcs. 

A second 100 MHz signal derived from output termi- 
nal 37 of the three-way power divider 34 is applied to 
a circulator 38 and emerges therefrom with a desired 
phase shift. The circulator 38 can be of any conven- 
tional type wherein a signal applied to an input port 
emerges from an output port with an appropriate phase 
shift. The 100 MHz signal is then transmitted to the 
brain 10 of the subiect being monitored via the antenna 
43 as the second component of the dual signal trans- 
mission. The antenna 43 can be of conventional type 
similar to antenna 41 herebefore described. As previ- 
ously noted, these two antennas may be combined in a 
single unit. 

The transmitted 100 and 210 MHz signal compo- 
nents mix within thc tissue in the brain 10 and interfere 
with one another yielding a signal of a frequency of 110 
MHZ, the difference in frequencies of the two incident 
components, modulated by electromagnetic emissions 
from the brain, i.e., the brain wave activity being moni- 
tored. This modulated 110 MHz signal is radiated into 
Space. 

The 110 MHz signal, modulated by brain wave activ- 
ity, is picked up by an antenna 45 and channeled back 
through the circulator 38 where it undergoes an appro- 
priate phase shift. The circulator 38 isolates the trans- 
mitted signals from the received signal. Any suitable 
diplexer or duplexer can be used. The antenna 45 can 
be of conventional type similar to antennas 41 and 43. 
It can be combined with them in a single unit or it can 
be separate. The reccived modulated 1 10 MHz signal is 
then applied to а band pass filter 42, to eliminate unde- 
sirable harmonics and extraneous noise, and the fil- 
tered 110 MHz signal is inserted into a mixer 44 into 
which has also been introduced a component of the 
100 MHz signal from the source 30 distributed by the 
RF power divider 34. The filter 42 can be any conven- 
Попа! band pass filter. The mixer 44 may also be of 
conventional type similar to thc mixer 40 herebefore 
described, 

The 100 MHz and 110.MHz signals combine in the 
mixer 44 to yield a signal of frequency equal to the 
difference in frequencies of the two component signals, 
i.e., 10 MHz still modulated by the monitored brain 
wave activity. The 10 MHz signal is amplified in an IF 
amplifier 46 and channeled to a demodulator 48. The 
IF amplifier and demodulator 48 can both be of con- 
ventional types. The type of demodulator selected will 
depend on the characteristics of the signals transmitted 
to and received from the brain, and the information 
desired to be obtained. The brain may modulate the 
amplitude, frequency and/or phase of the interference 
waveform. Certain of these parameters will be more 
sensitive to corresponding brain wave characteristics 
than others. Selection of amplitude, frequency or phase 
demodulation means is governed by the choice of brain 
wave characteristic to be monitored. If desired, зсуста! 
different types of demodulators can be provided and 
used alternately or at the same time. 

The demodulated signal which is representative of 
the. monitored. brain wave activity is passed through 
audio amplifiers 50 a, b, c which may be of convcn- 
tional type where it is amplified and routed to displays 
58 a, b, c and a computer 60. The displays 58 a, b, с 
present the raw brain wave signals from the amplifiers 


286 / 569 


3,951,134 


5 


50 a, b, c. The computer 60 processes. the amplifi ied -— 


brain-wave signals to derive information suitable for 
viewing, e.g., by suppressing, compressing, or expand- 
ing elements thercof, or combining them with other 


information-bearing signals and presents that informa- ` 


tion on a display 62, The displays can be conventional 
ones such as the types herebefore mentioned employ- 
ing electronic visual displays or mechanical plotters 
S8b. The computer can also be of conventiona! type, 
either analog or digital, or a hybrid. 

А profile of the entire brain wave emission pattern 
may be monitored or select areas of the brain may be 
observed in a single measurement simply by altering 
the scan angle and direction of the antennas. There is 
no physical contact between the subject and the moni- 
toring apparatus. The computer 60 also can determine 
a compensating waveform for transmission to the brain 
10 to alter the natural brain waves in a desired fashion. 
The closed loop compensating system permits instanta- 
ncous and continuous modification of the brain wave 
Tesponse pattern. 

In performing the brain wave pattern modification 
function, the computer 60 can be furnished with an 
external standard signal from a source 70 representa- 
tive of brain wave activity associated with a desired 
nuerological response. The region of the brain respon- 
sible for the response is monitored and the received 
signal, indicative of the brain wave activity therein, is 
compared with the standard signal. The computer 60 is 
programmed to determine a compensating signal, re- 
sponsive to the difference between the standard signal 
and received signal. The compensating signal, when 
transmitted to the monitored region of the brain, mod- 
ulates the natural brain wave activity therein toward a 
reproduction of the standard signal, thereby changing 
the neurological response óf the subject. 

The computer 60 controls an auxiliary transmitter 64 
which transmits the compensating signal to the brain 10 
of the subject via an antenna 66. The transmitter 64 is 
of the high frequency type commonly used in radar 
applications. Thc antenna 66 can be similar to antennas 
41, 43 and 45 and can be combined with them. 
Through these means, brain wave activity may be al- 
tered and deviations from a desired norm may be com- 
pensated. Brain waves may be monitored and control 
signals transmitted to the brain from a remote station. 

It is to be noted that the configuration described is 
onc of many possibilities which may be formulated 
without departing from the spirit of my invention. The 
transmitters can be monostratic or bistatic. They also 
сап be single, dual, or multiple frequency devices. The 
transmitted signal can be continuous wave, pulse, FM, 
or any combination of these as well as other transmis- 
sion forms. Typical operating frequencies for the trans- 
mitters range from 1 MHz to 40 GHz but may be al- 
tered to suit the particular function being monitored 
and the characteristics of the specific subject. 

The individual components of the system for moni- 
toring and controlling brain wave activity may be of 
conventionai type commonly employed in radar sys- 
tems. 

Various subassemblies of thc brain wave monitoring 
and control apparatus may be added, substituted or 
combined. Thus, separatc antennas or a single multi- 
mode antenna may be used for transmission and recep- 
поп. Additional displays and computers may Бе added 
to present and analyze select components of the moni- 
tored brain waves. 


20 


25 


35 


40 


45 


50 


55 


60 


65 


274 / 340 


Modulation of the interference signal retransmitted 
by the brain may be of amplitude, frequency and/or 
phasc. Appropriate demodulators may be used to deci- 
pher the subject's brain activity and select components 
of his brain waves may be analyzed by computer to 
determine his mental state and monitor his thought 
processes. 

As will be безе by those familiar with the. art, 
apparatus and method of the subject: invention has 
numerous uscs. Persons in critical positions such as 
drivers and pilots can be continuously monitored with 
provision for activation of an emergency device in the 
event of human failure. Seizures, sleepiness and dream- 
ing can be detected. Bodily functions such as pulse 
rate, heartbeat reqularity and others also can be moni- 
tored and occurrences of hallucinations can be de- 
tected. The system also permits medical diagnoses of 
patients, inaccessible to physicians, from remote sta- 
tions. 

What is claimed is: 

1. Brain wave monitoring apparatus comprising 

means for producing a base frequency signal, 

means for producing a first signal having a frequency 
related to that of the base frequency and at a pre- 
determined phasc related thereto, 

means for transmitting both said base frequency and 

said first signals to the brain of the subject being 
monitored, 

means for receiving a second signal transmitted by 

the brain of the subject being monitored in те- 
sponse to both said base frequency and said first 
signals, 

mixing means for producing from said base fre- 

quency signal and said received second signal a 
responsc signal having a frequency related to that 
of the base frequency, and 

means for interpreting said response signal. 

2. Apparatus as in claim 1 where said receiving 
means comprises 

means for isolating the transmitted signals from the 

received second signals. 

3. Apparatus as in claim 2 further comprising a band 
pass filter with an input connected to said isolating 
means and an output connected to said mixing means. 

4. Apparatus as in claim 1 further comprising means 
for amplifying said responsc signal. 

5. Apparatus as in claim 4 further comprising means 
for demodulating said amplified response signal. 

6. Apparatus as in claim 5 further comprising inter- 
preting means connected to the output of said demodu- 
lator means. 

7. Apparatus according to claim Е further comprising 

means for producing an electromagnetic wave con- 

trol signal dependent оп said response signal, and 
means for transmitting said control signal to the brain 
of said subject. 

8. Apparatus as in claim 7 wherein said transmitting 
means comprises means for directing the electromag- 
пейс wave control signal to a predetermined part of the 
brain. 

9. A process for monitoring brain wave activity of a 
subject comprising the steps of 

transmitting at lcast two electromagnetic energy sig- 

nals of different frequencics to the brain of the 
subject being monitored, 

receiving an electromagnetic energy signal resulting 

from the mixing of said two signals in the brain 
modulated by the brain wave activity and retrans- 


—— —2867 570 


287 


3,951,134 


7 
mitted by the brain in response to said transmitted 
energy signals, and, | 
interpreting said received signal. 

10. A process as in claim 9 further comprising thc 
step of transmitting a further electromagnetic wave 
signal to the brain to vary the brain wave activity. 

11. A process as in claim 10 wherein the step of 
transmitting the further signals comprises 

obtaining a standard signal, 


5 


10 


20 


25 


30 


35 


40 


45 


50 


55 


60 


65 


8 


. comparing said recéived' electromagnétic energy sig- 


nals with said standard signal, 
producing a compensating signal corresponding to 
the comparison between said received electrogag- 
netic energy signals and the standard signal, and 
transmitting the compensating signals to the brain of 


the subject being monitored. 
ж ж ж ж ж 


; ' Mengerikan! Senjata Fiksi-ll. i 
Active Denial System Non-lethal weapons capabil... g ) Test results show Active De... 


US Military UNMANNED TR... The Active Denial System (A... US military ADS Active Deni... Active Denial System: a tera... 


—-— — 


Ready, Aim, Fire: Hypersoni... 


E 


High-Power Microwave Dire. 


How about that? 


288 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


289 / 569 289 / 570 


«СО. 


291 / 569 278 / 340 291 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


295 / 569 295 / 570 


ж и лүү % 
р پک‎ " 
1 КЕ E 
га 


1 
\ -— 


4 


4 292 / 570 


TOP SECRET. 


Мина Jf AIRPORT 


TOWER. 


E | 
FLIGHT CONTROL. 


| | l Lett = 
i 1 ' | 
NOT ONLY AT AIRPORTS. | 
WE FIND THEM ON ROOFTOPS. = > 
Cm * е н | 


Dependent Multi-Lateration ooperative & 
(ADS-B Radio Stations) | Independents) O = 


7 رور 


:280 / 340 
= —F lll aa — — - 


T 


о 
Мә] 
[Тә] 
— 
Мә] 
о 
N 


«СО. 


297 / 569 281 / 340 297 / 570 


EMWatch.com - EMF Guidelines 


EMF Guidelines for Radio Frequency 
and Low Frequency Electromagnetic 


Radiation 


In which the health risk of various levels 


of EMF exposure are compared 


EMF Guidelines v1.3 Copyright www.emwatch.com 


а  —— 


298 / 569 282 / 340 298 / 570 


EMWatch.com - EMF Guidelines 


Contents 
EMF Guidelines Page 3 
Notes on EMF Guidelines Page 4 
Notes on Appendix 1 and Appendix 2 Page 8 
Appendix 1 - Radio-Frequency EMF Limits Page 9 
Appendix 2 — Low-Frequency EMF Limits Page 10 


e 


299 / 569 283 / 0 299/570 


EMWatch.com - EMF Guidelines 


EM Watch Electromagnetic Radiation Exposure Guidelines Copyright: www.emwatch.com 


Radio-Frequency Radiation Guidelines - for continuous and prolonged exposure 


: m Microwatts per 
Risk Level | Millivolts per Metre | Square meter 


2 10.0- 100 0.1-26.5 


Description 


Slight risk of serious health effects, especially for 
children / pregnant women 


8 100 — 650 26.5 — 1120 Moderate risk of serious health effects 


Low Frequency Electromagnetic Radiation Guidelines - for continuous and prolonged exposure 


Risk Level Milligauss MicroTesla Description 
2 10-20 04-02 Slight risk of serious health effects, especially for 
children / pregnant women 
3 2.0 — 5.0 0.2-0.5 Moderate risk of serious health effects 


Continuous and prolonged exposure means exposure for several hours a day, for several months - or years. 
Notes 


1. Electro-Hypersensitive people may experience discomfort at very low EMF levels (even at Risk 
Level 1). 


2. Pregnant women should spend most of their time in level 1, but brief visits to levels 2 and 3 will 
probably do no harm. Avoid level 4. 


3. Children should spend most of their time in level 1. Short periods of time may be spent in levels 2, 3 
and 4. 


4. Everyone should avoid continuous prolonged exposure at level 4. 
5. Bedrooms, schools, hospitals, libraries and workplaces should be at level 1. 


Use with discretion, and at your own risk. Bear in mind that no level of EMF has been proved absolutely 
safe (except zero). 


للل و 


300 / 569 284 / 0 300 / 570 


EMWatch.com - EMF Guidelines 


Two Kinds of Electromagnetic Radiation 


There are two kinds of man-made EMF (ElectroMagnetic Field) which are believed to be damaging to our 
health, and which are common in our homes and workplaces. 


One kind is called low-frequency EMF, which is emitted from all mains electrical devices, power lines and 
house wiring, electric motors and some electronic devices. 


The other kind is radio-frequency EMF which is emitted from all radio transmitters, cordless phones, cell 
phones, cell towers, wi-fi systems, and wireless communications devices. 


The two kinds have different qualities. They are measured differently, and the measurements are expressed 
In different units. That is why the EMF Guidelines on Page 1 above contain two separate sections. 


They are both important, because each can affect your health. 


This document deals with these two kinds of radiation only. 
What About Short-Term Radiation Exposure? 


The above guidelines are for long-term EMF exposure. That generally means several hours a day for years - 
but at the very least, months. 


What about occasional short-term exposure? If your exposure is limited to a few hours, or days at most, you 
are unlikely to suffer long-term health consequences, even if exposed to very high levels of radiation (but 
rather avoid it if you can!) 


The exception to this is pregnant women, and possibly very young children. They should avoid high levels of 
radiation, even for short periods. 


How Much Electromagnetic Radiation is Safe? 


Sooner or later, in your quest to understand the effects of electromagnetic radiation, you will probably want to 
understand the numbers. 


You may start to ask questions like “How much radiation is in my home right now?" 


Suppose you invited me into your house for a cup of tea or coffee, and you asked me to bring along my EMF 
meter. Walking around your lounge, holding a radio-frequency ЕМЕ meter in my hand, | notice that the 
readings around the room are between 40-100 mV/m , except over by the window, where the level is 
fluctuating around 250-350 mV/m (millivolts per metre). 


So is that too high? Should you be concerned? 


To find the answer, refer to our Guidelines (Page 3). You would see that the level of 40 to 100 mV/m spans 
the Low Risk and Moderate Risk levels, and that 250 — 350 mV/m spans the Moderate Risk and High Risk 
levels. 


We could take similar measurements in your whole house. So now you would have a much better idea of 
how much risk you are running, and where the "hotspots" are. The meter tells you the numbers. 


ل و 


301 / 569 285 / 0 301 / 570 


EMWatch.com - EMF Guidelines 


The EMF Guidelines tell you how much risk you are running. And from that information, you can decide what 
action, if any, you want to take to reduce your exposure. 


How Reliable are the Guidelines? 


There is no consensus among scientists as to what level of radiation creates a health risk in the population. 
Literally thousands of studies have been performed. This means that you can probably find studies to support 
your viewpoint, no matter what your viewpoint is. 


Companies who make profits from devices which generate electromagnetic radiation generally still take the 
view that there is insufficient evidence of any health risk. They, too can find studies to support this view. 
(Often, these are studies devised and funded by those companies!) 


However, most of the independent studies have found a relationship between high radiation levels and 
increased health risks. Using the results of these studies, it is possible to deduce the EMF exposure level 
which caused (or at least was associated with) an increase in the incidence of a particular disease. 


Many international bodies, governments and medical institutes have used this information to set legal limits 
or maximum exposure guidelines. (Over time, these limits may tend to move downwards, as increasing 
evidence is found of health effects.) 


Even the World Health Organization has recently acknowledged that electromagnetic radiation might cause 
serious diseases, such as cancer. 


But legal limits in the USA (and some other countries) have not been reduced from the very high levels which 
were set decades ago by the International Commission on Non-lonising Radiation Protection (ICNIRP). 


EM Watch has looked into the limits in force in various parts of the world and the recommendations of 
various expert bodies, and has used this information to compile these EMF Guidelines. 


How Much Radiation is Too Much for You? 


It appears from scientific research that no level of electromagnetic radiation (low-frequency or radio- 
frequency) is completely safe. Even low levels may cause biological damage. 


But the body has some ability to repair EMF damage. So if the amount of EMF you are receiving is within 
your repair capacity, no long-term damage is done. (Of course, the energy used to effect the repair could 
have been used by your body for some other useful purpose.) 


Generally speaking, the level of radiation which will affect your health depends on how much time you are 
exposed to it. 


But another factor is who you are and your state of health. A young, healthy adult can handle more EMF 
than a child or an older person, or a sick person. 


That is why any EMF guideline can only give an indication of the risks for the average person. Bear in mind, 
you may not be average! 


— — s للل‎ 


302 / 569 286 / 340 302 / 570 


EMWatch.com - EMF Guidelines 


Pregnancy 
Pregnant women have to be particularly careful because the foetus is very vulnerable. 


There is evidence that high levels of electromagnetic radiation can cause miscarriage. Also, it appears that 
EMF exposure in the womb can cause the unborn child to be more susceptible to various illnesses later in 
life. 


So a pregnant women would want to take special precautions to avoid high EMF levels. For example 


e Keep a good distance between your tummy and any electric oven (2 feet for an electric oven and at 
least 5 feet from a microwave oven) while it is cooking. 


е Do notallow any cell phone to come into contact with your tummy. Try to keep them at least 18 
inches away at all times. And if at all possible, avoid having a wireless phone in your house. 


We recommend that pregnant women learn as much as you can about EMF, from our website and 
elsewhere. This is a very important time to minimize your exposure to electromagnetic radiation. 


Electro-HyperSensitivity 


Some people have somehow become sensitized to certain kinds of EMF, rather like hay-fever sufferers who 
have become sensitized to pollen. People who are sensitive to EMF are called Electro-HyperSensitive (EHS) 
or just Electro-Sensitive. 


EHS people react to much lower levels of EMF than the rest of us, and they may be more likely than others 
to suffer serious diseases such as cancer when exposed to high EMF levels. 


Although you may not be EHS right now, you could become EHS if exposed frequently to high levels of EMF. 
The condition is acquired, and appears to be caused by previous EMF exposure. 


Using Our EMF Guidelines 


Until we know for sure what is, and is not safe, we believe the only sensible way to deal with electromagnetic 
radiation is to act on the precautionary principle. (Treat it as harmful until it proves to be safe.) 


Actually, there is already plenty of evidence that EMF is harmful, at least to the health of some people. See 
http://emwatch.com/emf-research-quality-and-quantity/. So it is unlikely that it will ever be proven to be safe. 


The EMF Guidelines are intended to be useful and practical, but to make the best use of them you will need 
to have access to the appropriate EMF meter (either a low-frequency meter or a radio-frequency meter, or 
both) 


Reducing Your EMF Exposure 


Radiation exposure has two components: intensity of radiation, and duration of exposure. 


It usually takes many years of EMF exposure to cause serious disease, and in the case of cancer this can be 
a decade or more. (It can even be two or three decades.) 


——————— s h 


303 / 569 287 / 340 303 / 570 


EMWatch.com - EMF Guidelines 


So it is a good idea to reduce your exposure now - before you get sick — to prevent your body from 
accumulating more radiation damage. 


EM Watch has plenty of information about how to reduce EMF exposure from many different sources. But 
without an EMF meter it is hard to know how much radiation you are getting, and where it might be coming 
from. So you may find it hard to take meaningful action. 


That is why we have reviewed what we consider to be the best low-frequency EMF meters as well as the 
best radio-frequency EMF meters and recommend that you get one of each, and use them to make your 
home and workplace safer. 


І hope you will be able to make use of these ЕМЕ Guidelines to reduce your ЕМЕ exposure and safeguard 
your health. | don't need to remind you how precious that is! 


Robert Sinclaire 
www.emwatch.com 


--------:-:-і:/ФБЫР--:-БС:;- 


304 / 569 288 /340 304 /570 


EMWatch.com - EMF Guidelines 


Notes on Appendix 1 & 2 


Appendix 1 shows the various international limits and recommendations for exposure to Radio-Frequency 
electromagnetic radiation (or EMF) in descending order (highest limits on top). 


EM Watch's own EMF Guidelines are also shown in this table, and the colors reflect the same risk levels we 
used in the Guidelines on page 1. (High risk is red.) 


Notice the huge disparity between different countries' limits. Leading the pack is the USA (with Canada and 
Japan) whose legal limit is 1000 times higher than Austria (already in our High Risk band) and 10,000 times 
higher than the Biolnitiative Report recommends. 


Appendix 2 is similar to Appendix 1, but shows various limits and recommendations for exposure to Low- 
Frequency magnetic radiation, again in descending order (highest limits on top), together with EM Watch's 
Guidelines. 


The table is color-coded to reflect the same risk levels used in the Guidelines on page 1. (High risk is red.) 
Again you will notice the enormous range. 


Many countries do not even set statutory limits for this kind of radiation, despite known health implications. 


в - 


305 / 569 289 / 340 305 / 570 


EMWatch.com - EMF Guidelines 


Appendix 1 — Radio-Frequency Electromagnetic Limits and Recommendations 


306 / 569 


| EM Watch Electromagnetic Radiation Exposure Guidelines Copyright: www.emwatch.com 
Radio / Microwave Radiation - International Safety Limits (Highest levels at top) 
Electric 
Field Power Density Country or Organization 
Strength 
mV/m W/m2 uW/m2 
650 0.001 1120 EM Watch Guidelines — Maximum for Level 3 - Moderate Risk 
614 0.001 1000 Biolnitiative Report - Limit for Long-Term Exposure to Pulsed Signal 
614 0.001 1000 Salzburg, Austria (1998) Sum GSM 
614 0.001 1000 Italy statutory limit for a single frequency 
600 0.001 954.9 Council of Europe (2011) - proposed indoor limit (also see 200 mV/m) 
200 0.0001 106.1 Council of Europe Report (2011) - proposed indoor limit for "medium term" 
194 0.0001 100.0 Building Biology Standard (2003) - Pulsed RF -"Extreme Anomaly" level 
135 0.0000 48.1 Median Level of 15 US cities in 1977 (Mainly VHF TV) 
100 0.0000 26.5 EM Watch Guidelines — Maximum for Level 2 - Slight Risk 
61 0.0000 10.0 Salzburg, Austria (2002) GSM / 3G Limit for Residences (Outdoors) 
43 0.0000 5.0 Building Biology Standard (2003)- Pulsed RF -"Strong Anomaly" level 


— —— » )— 


290 / 340 


306 / 570 


EMWatch.com - EMF Guidelines 


Appendix 2 — Low-Frequency Magnetic Radiation Limits and Recommendations 


| Low-Frequency Magnetic Radiation — International Safety Limits (Highest levels at top) 


MilliGauss | MicroTesla Country or Organization 


5.0 0.5 EM Watch Guidelines — Maximum for Level 3 - Moderate Risk 

5.0 0.5 Building Biology Standard (2003) - ELF magnetic -"Extreme Anomaly" 

29 0.25 American National Standards Institiute (ANSI) limit 

2.5 0.25 National Council for Radiation Protection and Measurement (NCRP)(USA) 
2.5 0:25 Confederation of Professional Employees (Sweden) 

20 0.2 ЕМ Watch Guidelines - Maximum for Level 2 - Slight Risk 

2.0 0.2 Biolnitiative Report - Planning Limit for all new construction projects 


— — o jp 


307 / 569 291 / 340 307 / 570 


SECUR 


308 / 569 292 / 340 308 / 570 


«See rs. 


310 / 569 294 / 340 310/ 570 


EMF Levels & Safety 


It can be very hard to say exactly what levels of EMF are safe, because safety in this arena is often a relative concept 
based on frequency, exposure time, and possible individual sensitivity. Even then, studies are often considered incon- 
clusive plus there is the potential for political and financial agenda to steer perception one way or the other. 


In order to be fair and equitable while remaining informative, this document has been assembled in order to examine / 
compare / contrast various safety standards, average environmental levels and references along a continuum to better 
explain technical measurements in context. This document is offered free of charge, though if published, posted or 
reproduced in any fashion, crediting ScanTech as the document creator is requested. 


Magnetic Fields Conversion Table 


1 mG (milliGauss) - 100 пТ (nanoTesla) 

1 nT 5 10 uG (microGauss) or 0.01 mG 

100 microTeslas - 1 Gauss 

1 microTesla - 10 mG 

1 milliTesla - 10 Gauss 1 Tesla - 10,000 Gauss 

1 nT = 1000 рТ (picoTeslas) = 0.01 mG (10 microGauss) strongest brainwave is 1,000 times less 

1рТ- 1000 fT (femtoTesla) 

1 nT = 1,000,000 fT The best resolution of a SQUID (Super Quantum Interference Device) is 1,000,000 times less 


Magnetic Fields - A Relative Comparison 


LOW LEVEL MAGNETIC FIELDS 


Smallest value in a magnetically shielded room 10^-10 Gauss (0.1 nanoGauss) 
SQUID 1.0 fT (femtoTesla) 
(0.1 nanoGauss) 

Human Brain Magnetic Field 0.1 — 1.0 pT (picoTeslas) 

( 0.01 - 0.1 microGauss) 
Human Heart Magnetic Field 50^-12 Tesla (5 microGauss) 
Galactic magnetic field 10 microGauss 
Solar Wind 50 microGauss 
Interstellar molecular cloud 1 milligauss 
Interstellar Space 10^-6 Gauss (1 microGauss) 


311 / 569 295 / 340 311/570 


312 / 569 


EMF & RF Safety Levels - A Comparative Guide 
www.scantech7.com 


Hypothesized & Observed Animal Sensitivies to Magnetic Fields 
Honeybees 

Homing Pigeons 

Sharks & Whales 

Lowest level to cause reaction in Electromagnetically Sensitive Patients 


Swedish Safety standard 

California Safety Limit for Public Schools 

Indoor EMF levels (when good wiring practices followed) 
New Swiss Standard 

Maximum residential levels in Brentwood TN & Irvine, CA 


ScanTech 
214.912.4691 


0.25 mG 

0.1 mG 

0.5 mG 

0.1 - 0.2 mG 


1.0 mG (proposed US EPA standard) 
1.2 mG 

0.1 — 1.2 mG 

2.5 mG ELF 0.25 mG VLF 

4 mG 


Cancer researchers concerned with recent powerline issues are coming up with many reports on oncological effects of 


very low-level 1 mG ELF electromagnetic fields 


Leukemia studies which link low level EMF fields 


2-4mG 


A study (Ahlbom & Feychting, 1993) reported that at 2 mG and above, exposed children were 2.7 times as likely to de- 
velop cancer as unexposed children, and at 3 mG and above, the odds rose to 3.8 times as likely! 


Computer Monitors - VDTs should produce magnetic fields of no more than 2 mG at a distance of 30 cm (about 1 ft) from 
the front surface of the monitor and 50 cm (about 1 ft 8 in) from the sides and back of the monitor. 


The TCO'92 standard has become a de facto standard in the VDT industry worldwide. A 1999 standard, promulgated by 
the Swedish TCO (known as the TCO'99 standard), provides for international and environmental labeling of personal 
computers. Many computer monitors marketed in the U.S. are certified as compliant with TCO'99 for low magnetic fields. 


Indoor EMF levels with poor wiring practice 

Hotspots near breaker boxes, transformers 

Directly beneath high voltage lines 

Amount which affects CRT computer monitors (flat screens immune) 


STRONGER EMF FIELDS 


3 - 20mG 

20 — 2000 mG 
2- 250 mG 
10 mG 


(please note that the DC Magnetic Fields listed are not generally attributed as having negative health effects - 
and in fact, a number of alternative health experts actually recommend using magnets for healing and fitness) 


Earth DC Magnetic Field (natural) 

Earth DC Magnetic Fields (affected by building structure) 
Recommended Limit for Pacemakers 

Refrigerator Magnet (thin label type) 

Magnetic Field which could erase magnetic data 
Average Bar Magnet (DC) 

Independent research finds a change in blood behavior 
Strongest Inexpensive Ferrite Magnets 


330 mG(equator) - 670 mG (poles) 
200 mG — 800 mG 

1000 mG (1 Gauss) 

10 Gauss 

10 Gauss 

100 Gauss 

500 Gauss 

1000 Gauss 


High magnetic field levels exceeding 100 Gauss (100,000 mG) may cause a temporary visual flickering sensation 


called magnetophosphenes which disappears when the field is removed. 


Gauss required to affect / erase magnetic tape 
Magnets used in Biomagnetic Therapy (DC) 
High Powered Neodymium N42 - N45 Magnets (DC) 


296 / 340 


2000 - 3000 Gauss 
300 - 3000 Gauss 
7500 - 9200 Gauss 


312/570 


313 / 569 


EMF & RF Safety Levels - A Comparative Guide ScanTech 


EXTREME LEVEL MAGNETIC FIELDS 


High Level Laboratory Superconducting Electromagnet 100,000 - 130,000 Gauss 
Strongest Sustained Magnetic Field in a Lab 450,000 Gauss 
Strongest Magnetic Spike artificially produced (4 - 8 microseconds) 10,000,000 Gauss + 
Magnetic Field Instantly Lethal to Organic Life 10^9 Gauss 

Surface of a Neutron Star 10^12 - 10^13 Gauss 
Surface of a Magnetar 10^15 Gauss 

Highest Theorietical Magnetic Field 10^49 - 10^53 Gauss 


EMF MEASURING INSTRUMENT RANGES 


Typical Range for inexpensive EMF meter 1-10 mG 

Range for Quality EMF meter 0.1 — 200 mG 
Sensitive High Quality Reference Meter 0.01 — 2000 mG 
Commerical High Field Gaussmeter 1 mG - 20 kilogauss 


ICNIRP Guidelines for EMF Exposure 


International Commission on Non-lonizing Radiation Protection (ICNIRP) is an organi- 
zation of 15,000 scientists from 40 nations who specialize in radiation protection. 


Exposure (60 Hz) Electric field Magnetic field 
Occupational 8.3 kV/m 4.2 G (4,200 mG) 
General Public 4.2 kV/m 0.833 G (833 mG) 


International Commission on Non-lonizing Radiation Protection (ICNIRP) is an organization of 
15,000 scientists from 40 nations who specialize in radiation protection. 
Source: ICNIRP, 1998. 


The National Radiological Protection Board (NRPB) says the UK should adopt international exposure standards. The 
NRPB has recommended for many years that nobody should be exposed to a level higher than 1,600 microTeslas. (16 
mG) 


But in a consultation document on restricting people's exposure, it now recommends the UK should adopt the guidelines 
of the International Committee on Non-lonizing Radiation Protection (Icnirp). 


The commission's recommended level is far lower, at 100 microTeslas. (1 mG) 


297 / 340 


www.scantech7.com 214.912.4691 


313 /570 


314 / 569 


EMF & RF Safety Levels - A Comparative Guide 
www.scantech7.com 


ScanTech 
214.912.4691 


ACGIH Occupational Threshold Limit Values for 60-Hz EMF 
American Conference of Governmental Industrial Hygienists (ACGIH) is a professional organization that facili- 
tates the exchange of technical information about worker health protection. It is not a government regulatory 


Occupational exposure should not 
exceed for longer than 2 hours 


Exposure limit for workers as sug- 
gested by the ACGIH 


Prudence dictates the use of protec- 
tive clothing above 


Exposure Limit for workers as sug- 
gested by the IRPA/INIRC 


German Limit 


Exposure of workers with cardiac 
pacemakers and other electronic 
implants should not exceed. 
Montana has adopted this exposure 
limit and may be authoritative in the 
EU soon. 


Recommended 1996 as maximum 
for "workers" and their working envi- 
ronments by the NCRP, but not yet 
official. 

Influences Melatonin synthesis** 
Already viewed as "critical" by many 
scientists 


Aaronia "E2" recommendation 
Recommended 1996 as maximum 
for "private individuals" by the NCRP, 
but not yet official 


Aaronia "E1" recommendation 


agency. 


Electric field 


25 kV/m 


20 kV/m 


15 kV/m 


10 kV/m 


5 kV/m 


1 kV/m 


100 V/m 


10 V/m 


1 V/m 


Magnetic field 


10 G (10,000 mG) 


1 G (1,000 mG) 


5 G (5,000 mG) 


1 G (1,000 mG) 


1 G (1,000 mG) 


10 mG 


1.0 mG 


0.1 mG 


American Conference of Governmental Industrial Hygienists (ACGIH) is a professional organization that facili- 
tates the exchange of technical information about worker health protection. It is not a government regulatory 


agency. 


Source: ACGH, 2001. 


298 / 340 


314 / 570 


EMF & RF Safety Levels - A Comparative Guide ScanTech 


www.scantech7.com 214.912.4691 


315 / 569 


RF Levels & Safety 


OSHA 1910 Subpart С 1910.97 Occupational health and environmental control  Non-ionizing radiation 

The exposure limit in this standard (10 mW/sq. cm.) is expressed in voluntary language and has been ruled unenforce- 
able for Federal OSHA enforcement. The standard does specify the design of an RF warning sign. 

For PCS antennas, the 1992 ANSI/IEEE exposure standard for the general public is 1.2 mW/cm-sq 

For cellular phones, the ANSI/IEEE exposure standard for the general public is 0.57 mW/cm-sq 

ICNIRP standard is 0.40 mW/cm-sq for cellular phone frequencies and 0.90 mW/cm-sq for PCS phone frequencies 
NCRP guideline is 0.57 mW/cm-sq for cellular phone frequencies and 1.00 mW/cm-sq for PCS phone frequencies 
C95.1 - 1999 IEEE / ANSI Standard 1 mW/cm^2 controlled environment 0.2 mW/cm^2 public averaged over 6 
minutes 

IEEE guidelines legally enforceable vary by frequency (10000 / frequency^2) 

Pacemaker Manufacturers 

Guidant 5.2 mW / cm^2 

Medtronics 2.6 mW / cm^2 

Massachusetts adopted IRPA recommendations 200 microwatts/ cm^2 SAR 0.04 W / kg 

Kirkland AFT Portland, Oregon 100 microwatts / cm^2 


Soviet Union 1 microwatt / cm^2 
Humans absorb most radiation between 30 - 100 MHz and especially between 77 - 87 MHz. 


SAR for cell phones - SAR stands for Specific Absorption Rate, which is the unit of measurement for the amount of RF 
energy absorbed by the body when using a mobile phone. Energy absorption from RF fields in tissues is measured as 
a SAR within a given tissue mass 


The unit of SAR is watts per kilogram ( W/kg ) 


RESOURCE LINKS FOR LOOKING UP THE SAR RATINGS OF VARIOUS CELL PHONES 


http://www.mmfai.org/public/sar.cfm 
www.fcc.gov/oet/fccid 


FCC CELL PHONE RADIATION STANDARDS 


North American Standard 1.6 Watts per Kg averaged over 1 gram of body tissue 
European Standard 2.0 Watts per Kg average over 10 grams of body tissue 
Safety factor of 10 later added to create a 0.4 W / kg standard 

NCRP recommends 0.08 W / kg 


A typical 802.11b wireless network card will transmit at around 30 milliwatts (a few 100mW and 200mW cards out there) 
and operates in the 2.4 GHz frequency band. Current FCC regulations limit power output to 1 Watt EIRP (Effective Iso- 


299 / 340 


315 / 570 


EMF & RF Safety Levels - A Comparative Guide ScanTech 
www.scantech7.com 214.912.4691 


tropic Radiated Power) for 802.11b (2.4GHz) devices 


A study conducted іп the Unites States found that, in large cities , the average background RF levels were about 50 p 
W/m 2 . About 1% of people living in large cities are exposed to RF fields exceeding 10 mW/m 2. Higher RF field levels 
can occur in areas located close to transmitter sites or radar systems. 


The average GSM mobile handset has a power output of around 600 milliwatts 

Compare this with microwave ovens, which can emit 500 to 700 Watts 

RF fields between 10 MHz and 10 GHz penetrate exposed tissues and produce heating due to energy absorption in 
these tissues. The depth of penetration of the RF field into the tissue depends on the frequency of the field and is greater 
for lower frequencies. 

SAR is the basic dosimetric quantity for RF fields between about 1 MHz and 10 GHz. A SAR of at least 4 W/kg is 
needed to produce adverse health effects in people exposed to RF fields in this frequency range. Such energies are 


found tens of meters away from powerful FM antennas at the top of high towers, which makes these areas inaccessible. 


RF fields above 10 GHz are absorbed at the skin surface, with very little of the energy penetrating into the underlying 
tissues. 


For adverse health effects, such as eye cataracts and skin burns, to occur from exposure to RF fields above 10 GHz, 


power densities above 1000 W/m 2 are needed. Such densities are not found in everyday life. They do exist in very 
close proximity to powerful radars. Current exposure standards preclude human presence in this areas. 


RADIATION LEVELS & SAFETY 


Rem ( R oentgen E quivalent M an) is the unit of Dose (actually absorbed taking biological effects into account) 
Rad (Roentgen Absorbed Dose) is simply the actual amount of radiation absorbed 
Rem - Rads x Quality Factor (QF) 


where the Quality Factor depends on the type of radiation. Heavy particles as alphas have a QF of 20, neutrons have a 
QF of 3-10 depending on the energy of the neutrons. Betas and gammas have a QF of 1. 


The amount of ionising radiation, or 'dose', received by a person is measured in terms of the energy absorbed in the 
body tissue, and is expressed in gray . One gray (Gy) is one joule deposited per kilogram of mass. 


Equal exposure to different types of radiation expressed as gray do not however necessarily produce equal biological 
effects. One gray of alpha radiation, for example, will have a greater effect than one gray of beta radiation. When we talk 
about radiation effects, we therefore express the radiation as effective dose, in a unit called the sievert (Sv). 


1 Rem = .01 Sieverts 


A former unit of (radio)activity is the Curie - 1 Bq is 27 x 10 -12 curies. 

Title 10 Code of Federal Regulations Part 20 (10CFR20) is the NRC regulation governing radiation protection at a nu- 
clear power plant. This regulation imposes requirements on such important items as annual allowed radiation exposure, 
radiation protection methods, radioactive releases, and records. 


Adult workers may receive a whole body dose 5 Rem per year; minors are restricted to 0.5 Rem per year; pregnant 
women are restricted to 0.5 Rem during the term of the pregnancy (for protection of the embryo). For comparison, actual 
physical effects (minor blood changes) from radiation exposure are not expected until a person receives 25 Rem in a 
short period of time. Higher eye and extremity doses are allowed because these have less effect than on that part of the 


316 / 569 300 / 340 316 / 570 


EMF & RF Safety Levels - A Comparative Guide ScanTech 
www.scantech7.com 214.912.4691 


body containing blood-forming organs. 


However there is no scientific evidence of risk at doses below about 50 millisieverts in a short time or about 100 mil- 
lisieverts per year. At lower doses and dose rates, up to at least 10 millisieverts per year, the evidence suggests that 
beneficial effects are as likely as adverse ones. 


High radiation areas are those where a person could receive more than 100 millirem in an hour. 


At a nuclear plant, areas containing radioactive materials may be classified according to radiation level, contamination 
level, and airborne radioactivity level. Unrestricted areas are those where a person could expect to receive less than 500 
millirem in a year. 


Background radiation levels are typically around 300 millirem per year. In some areas of the world, background levels 
can reach as high as 15,000 millirem 


Naturally occurring background radiation is the main source of exposure for most people. Levels typically range from 
about 1.5 to 3.5 millisievert per year but can be more than 50 mSv/yr. The highest known level of background radiation 
affecting a substantial population is in Kerala and Madras States in India where some 140,000 people receive doses 
which average over 15 millisievert per year from gamma radiation in addition to a similar dose from radon. Comparable 
levels occur in Brazil and Sudan, with average exposures up to about 40 mSv/yr to many people. 


Several places are known in Iran, India and Europe where natural background radiation gives an annual dose of more 
than 50 mSv and up to 260 mSv (at Ramsar in Iran). Lifetime doses from natural radiation range up to several thousand 
millisievert. However, there is no evidence of increased cancers or other health problems arising from these high natural 


levels. 

1 adult human (100 Bq/kg) 7000 Bq 

1 kg of coffee 1000 Bq 

1 kg superphosphate fertiliser 5000 Bq 

The air in a 100 sq metre Australian home (radon) 3000 Bq 

The air in many 100 sq metre European homes (radon) 30 000 Bq 

] household smoke detector (with americium) 30 000 Bq 
Radioisotope for medical diagnosis 70 million Bq 
Radioisotope source for medical therapy 100 000 000 million Bq 
1 kg 50-year old vitrified high-level nuclear waste 10 000 000 million Bq 
1 luminous Exit sign (1970s) 1 000 000 million Bq 
1 kg uranium 25 million Bq 

] kg uranium ore (Canadian, 1596) 25 million Bq 

1 kg uranium ore (Australian, 0.396) 500 000 Bq 

1 kg low level radioactive waste 1 million Ва 

1 kg of coal ash 2000 Bq 

1 kg of granite 1000 Bq 


317 / 569 301 / 340 317 / 570 


EMF & RF Safety Levels - A Comparative Guide ScanTech 
www.scantech7.com 214.912.4691 


RADIATION LEVELS & THEIR EFFECTS 


The following table gives an indication of the likely effects of a range of whole body radiation doses and dose rates to 
individuals: 


10,000 mSv (10 sieverts) as a short-term and whole-body dose would cause immediate illness, such as nausea and de- 
creased white blood cell count, and subsequent death within a few weeks. 

Between 2 and 10 sieverts in a short-term dose would cause severe radiation sickness with increasing likelihood that this 
would be fatal. 


1,000 mSv (1 sievert) in a short term dose is about the threshold for causing immediate radiation sickness in a person of 
average physical attributes, but would be unlikely to cause death. Above 1000 mSv, severity of illness increases with 
dose. 


If doses greater than 1000 mSv occur over a long period they are less likely to have early health effects but they create a 
definite risk that cancer will develop many years later. 


Above about 100 mSv , the probability of cancer (rather than the severity of illness) increases with dose. The estimated 
risk of fatal cancer is 5 of every 100 persons exposed to a dose of 1000 mSv (ie. if the normal incidence of fatal cancer 
were 25%, this dose would increase it to 30%). 


50 mSv is, conservatively, the lowest dose at which there is any evidence of cancer being caused in adults. It is also the 
highest dose which is allowed by regulation in any one year of occupational exposure. Dose rates greater than 50 mSv/yr 
arise from natural background levels in several parts of the world but do not cause any discernible harm to local popula- 
tions. 


20 mSv/yr averaged over 5 years is the limit for radiological personnel such as employees in the nuclear industry, ura- 
nium or mineral sands miners and hospital workers (who are all closely monitored). 


10 mSv/yr is the maximum actual dose rate received by any Australian uranium miner. 


3-5 mSvlyr is the typical dose rate (above background) received by uranium miners in Australia and Canada. 


3 mSvlyr (approx) is the typical background radiation from natural sources in North America, including an average of al- 
most 2 mSv/yr from radon in air. 


2 mSvlyr (approx) is the typical background radiation from natural sources, including an average of 0.7 mSv/yr from ra- 
don in air. This is close to the minimum dose received by all humans anywhere on Earth 


0.3-0.6 mSv/yr is a typical range of dose rates from artificial sources of radiation, mostly medical. 


0.05 mSvlyr , a very small fraction of natural background radiation, is the design target for maximum radiation at the pe- 
rimeter fence of a nuclear electricity generating station. In practice the actual dose is less. 


318 / 569 302 / 340 318 / 570 


319 / 569 


EMF & RF Safety Levels - A Comparative Guide 


www.scantech7.com 


90 dB 


92 dB 


95 dB 


97 dB 


100 dB 


102 dB 


105 dB 


110 dB 


115 dB 


NOISE LEVELS OSHA Safety Limits 


8 hours 
6 hours 
4 hours 
3 hours 
2 hours 
1.5 hours 
1 hour 
0.5 hours 


0.25 hours or less 


303 / 340 


ScanTech 
214.912.4691 


319 / 570 


«See rs. 


320 / 569 304 / 340 320/ 570 


1. puro, МТРА PUBLIC INSPECTION рх 5196 


The aforementioned panel under the direct presidential directive signed 
on 26 September 1917, has been tasked with responsibility ef providing 
answers to a most troublesome and disturbing phenomenon, that ef other-world 
visitation and what it portends fer the human family, It is im this vein that 


the panel has addressed the problem and in providing possible answers, 
II, TABLE OF CONTENTS 


i f A. Nature ef the Investigation. 

hes | B, Panel's Centributiem te tke TOP SECRET MAJESTIC Веззагсһ and 
ма Intelligence Program, 

"M 

b. ' С. А Review of the Military Assessment with Selected Cemments Drawn 
8/71: fren Cenclusiems ef the JIC and ЦС Members. 


D, Problems ia Relation te Technology. 
E, Problems im Relation te Nuclear Weapens Development, 
F,  Preblems in Relation te Bielegical Warfare Pregramo, 


0. Preblems in Relation te Gemetic and Pharmaceutical Deve lopment 


Н. Preblem im Relation te New Materials Deve lopment, 


I,  Preblems im Melatiem te Planned Future Rocket Deve lopment Pregrams, 


6%. Je  Preblems іл Relatien te Nuclear Prepulsien Development Pregrams, 


2. K,  Preblems in Relation Ae Intelligence Gathering and Analysis. 

ha ) s 1. Preblems in Relation te Foreign Policy and National Security, 

M M,  Preblems in Relatien te Déenes tic and Censtitutienal Issues, 

k h ^ M,  Preblems in Relation te Secial, Religieus and Scientific Reaction. 
ri 


к FE ТА 0.  Preblems in Melatien te the Се14 War Development, 


L P,  Preblems im Melatien te the Government Policy ef Contrel and Denial, 


| FOR OFFICIAL USE ONLY 
АЕ» Ds 


Да ... DER бї MTLE пития этиште 834021-1 
e m 


Ad. >, S а 
cus SAS NES 


= 


е PS ye рагу 


y ` 


312 / 340 à 327 / 570 


O 
N 
N 
bs 
UY 
о 
(Тө) 


«СО. 


321 / 569 306 / 340 321/570 


Y p 
PP DO. TEES 
‘November 4, 19537 


То: Tho Director of Central Intelligence 


І have studied the MJTWELVE Operations Plan of June 16, 

2955, ол the subject of instructions for the expenditures of 
tne National UFO Intelligence Program, and more Bpocifically, 
the Special Operations Instructions to be issued to Unified 
and Specific Major Gommands and Commanders. Іп connection 
with my Classified Basic Authorization of March 22, 1953, and 
the Implementing Instructions of January 23, 1953, 1 have no 
further instructions +o add, 


All the provisions covered in your NSC letter of May 22, 1953, 
are satisfactory to me, and 1 approve them, including tho 
changes recommended Бу your intelligence staff, with the fol- 
lowing exceptions: 


(8) The penultimate paragraph, page 4 of Inclosure 
Number 3 to your letter needs to be revised. J am 
concerned that this paragraph as writton could be 
misinterpreted by Regional and Local Commanders CONUS 

as giving them license to go beyond the restrictions 

set forth in these documents if the situation wero to 
appear serious enough ав to threaten hostile Soviet 
action. It seems beet to mo to oliminatc this para- 
graphe it has, been suggested that this difficulty 

could be averted by deleting the words "utilizing 

the criteria and procoduros set forth in these instruc- 
tione" and substituting therefor "observing the criteria, 
procedures, and restrictions set forth in these anstruc- 
tions." X would prefer the deletion of this paragraph. 
altogether from this and 023 related documents. 


(b) With regard to the.baeic lotter of Мау 22, 1953, 
Y would like to have-added to paragraph 2. the words 
.. “subject to COMINT agreements іп accordance with Ws, 
йі = Mx ап СТА intelligence collection directives.” ^7 c 
“ewan гер pem - а edad | k 2. ñ v. "o Мұ IDEE кы Ee Dono tm n 


PRR "Sv son 


322 / 569 307 / 340 322/57 


О UN E i nts s. . 


323 / 569 


lo 


aize tthe need for he utmost discretion 


"aud understanding in exercising the authority set forth in - 


these documents. Accordingly, І would iike you to find 


‘pome way to brief the various Authorizing Commanders on the 
> gubjoct to ensure that all are of one mind ав to tho letter 


and spirit of these instructions. Preferably, I would like 
to mee this done in а closed meeting to bc arranged through 
the Director of the National Security Agency, yoursels, and 
representatives of the Md-12/special Studies Project. 1 

specifically want Project JEHOVAH director Professor Albert 


Einstein and Doctor Robert Oppenheimer to inject any useful | 


commento іо the briefing as they are most informed оп the 
physics rciated to the subject. Perhaps the annual Quantico 
conference could provide an opportunity to do this without 


the publicity which would call attention to a special meetings 


Sincerely, 


Dwight D. Еі зеломех 


308 / 340 


= um 


ШӘ oe 


NECEM 


—— + 


и 


p 


| 
І 
| 


323/57 


324 / 569 


? copies 


TOP SECRET (downgraded to SECRET) 
UFO 


November 4, 1953 


To: The Director of Central Intelligence 


I have studied the MJTWELVE Operations Plan of June 16, 

1953, on the subject of instructions for the expenditures of 
the National UFO Intelligence Program, and more specifically, 
the Special Operations Instructions to be issued to Unified 
and Specific Major Commands and Commanders. In connection 
with my Classified Basic Authorization of March 22, 1953, and 
the Implementing Instructions of January 23, 1953, I have no 
further instructions to add. 


All the provisions covered in your NSC letter of May 22, 1953, 
are satisfactory to me, and I approve them, including the 
changes recommended by your intelligence staff, with the fol- 
lowing exceptions: 


(a) The penultimate paragraph, page 4 of Inclosure 
Number 1 in your letter needs to be revised. І am 
concerned that this paragraph as written could be 
misinterpreted by Regional and Local Commanders CONUS 
as giving them license to go beyond the restrictions 
set forth in these documents if the situation were to 
appear serious enough as to threaten hostile Soviet 
action. It seems best to me to eliminate this para- 
graph. It has been suggested that this difficulty 
could be averted by deleting the words "utilizing 


the criteria and procedures set forth in these instruc- 
tions" and substituting therefor "observing the criteria, 
procedures, and restrictions set forth in these instruc- 
tions." І would prefer the deletion of this paragraph 
altogether from this and all related documents. 


(b) With regard to the basic letter of May 22, 1953, 
I would like to have added to paragraph 2.b the words 
"subject to COMINT agreements in accordance with NSA 
and CIA intelligence collection directives." 

TOP SECRET (downgraded to SECRET) 


309 / 340 324 / 57 


TOP SECRET (downgraded to SECRET) 
_2— 


I cannot overemphasize the need for the utmost discretion 
and understanding in exercising the authority set forth in 
these documents. Accordingly, I would like you to find 

some way to brief the various Authorizing Commanders on the 
subject to ensure that all are of one mind as to the letter 
and spirit of these instructions. Preferably, I would like 
to see this done in a closed meeting to be arranged through 
the Director of the National Security Agency, yourself, and 
representative of the MJ-12 Special Studies Project. І 
specifically want Project JEHOVAH director Professor Albert 
Einstein and Doctor Robert Oppenheimer to inject any useful 
comments to the briefing as they are most informed on the 
physics related to the subject. Perhaps the annual Quantico 
conference could provide an opportunity to do this without 
the publicity which would call attention to a special meeting. 


Sincerely, 


Dwight D. Eisenhower 


TOP SECRET (downgraded to SECRET) 
exempt from declassification 

found in Dulles security oe 

„К, 


325 / 569 310 / 340 325 / 57 


SECUR 


326 / 569 311/340 326 / 570 


SECUR 


328 / 569 313 / 340 328 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


2t AD DUE IY= s 
THAAD Ballistic Missile Defense je + `, € 5D JOINT 
The Terminal High Altitude Area Defense Y 
(THAAD) is a key element of the Ballistic Missile 
Defense System. The THAAD Battery will 
provide transportable interceptors, 
using "Hit- To-Kill" technology to destroy 
ballistic missiles inside and outside the 
atmosphere. A Battery consists of 
6 truck-mounted launchers, 48 interceptors 
(8 per launcher), І AN/TPY-2 radar, 
and | Tactical Fire Control/Communications 
component. 


Mission: Provides Combatant Commanders with a deployable, ground-based missile defense 
capability against short and medium-range ballistic missiles and asymmetric threats inside and 
outside the atmosphere. 


FY 2018 Program: Supports the procurement of 34 interceptors and associated 
components, as well as support and training equipment. Continues fielding and sustainment 
activities for seven THAAD Batteries. Continues development of THAAD software upgrades 
to address threat packages, defense planning, improved capability to engage short-range ballistic 
missiles, medium-range ballistic missile, limited intermediate-range ballistic missile threats, and 
limited integration of the THAAD battery capability into the Integrated Air and Missile Defense 
Battle Command System (IBCS) planning process. 


Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA 


Budget per year are around $ 750 millions for this weapon system above. 
It just need a few upgrades to shoot down E.T. And blow up E.T Bases. 


Е 


SS 


x 


. 
- 
Е 


S 
11 0411 images 


MAR Report 174 


> 
е 
0 
с 
u; 
Чом. 
© 
же 
= 
0 
Е 
T 
б 
с. 
Ф 
a 
5 
ж? 
° 
£ 
0. 
t 
0 
Ф 
0 
5 
с 
5 
G 
> 
Ф 
2 
Ф 
Е 
май 


TBM - Tunnel Boring Mach 


U.S. Ait Force Tunnel Boring Machine 1982 


„= e 


bd THIS IS ONE OF THE WEAPONS GOD GAVE US. 


EA 3. — 
PEL DO 
Vir ee 4... чч 


Ў Ld Т к Е - - ' E Е ва "а 
“= 6-74) . - „ “А132 /,34 ' 4 = ° 2905720 


ЛАГИ 
AU HE 


| 
m 


М 


145 / 569 


SECUR 


331/569 315 / 340 331/570 


SECUR 


353 / 569 337 / 340 353/570 


RECEIVED 


III, CONCLUSIONS 


1. Current studies of otherworld visitation are im three 
phases: 


=, Technology exploitation 
b, Interplanetary travel 
с. Cultural communication 


2, Оп 19 September 1917, the IAC, JIOA, and the JIC, reviewed 
а Top Secret intelligence mport titled PORT TO THE PRESTDENT ا‎ MM — 
` 1=\, MAJIC BYES ONLY, DTG 000190917, Tho report montions: "Inc 

with your directive e e « 9. uly 1917, sn attached "REPORT on ae 

SAUCES" ; is respeotfully submitted, Тп consonance with your instructions, 

advisors from State, Treasury, War and Navy Departments assisted mo on a- 

two month exploratory mission concerning the reality of other-world visitation, ` 

The principle investigators and storage areas were visited, Successful efforts 

were made to reach scientists of all levels as measurod by their work in 

classified defense projects, Conferences were held with national seaurity 

officials and leaders of private industry. Approximately 1,200 memoranda and 
p intelligence reports were considered, The roport presents this situation 

against а global background my estimates, current and projected, in both the 

П.5., and allied countries, and recommendations deemed to be sound courses of 

action for formulating plans and policies in light of recent developments. 


3. All efforts have been made to identify the country or private 
concern wich ceuld have the technical and finacial resources necessary to 
produce such а long-range flight, 5з far, no country on this earth has the 
means and the security of its resources to produce such, 


h, А consensus reached by members of the panel, that until 
positive proof that the Russians did not attempt a series of reconnaissance 
flights over our most secure installations—the sightings and recovered 
objects are interpalnetary in nature, 


5. Тһе occupants of these planform vehicles аге, in most 
respects, human or human-like, Autopsies, so far indicate, that these beings 


share the same biological al needa аз humans, 


332 / 569 316 / 340 332/570 


IV, DISCUSSIOR 


A. Mature of the Investigation. 


An analysis has been made of the first one-hundred intelligence 
reports ia the ATIC Imterrogatiom Reports ami the ULATT EXPLOITATION 
MAJESTIC SERIES 1-25, prepared by the Military Imtelligosco Soctiom of 
GHCÁIPU, ix order te establish what material of flying saucer intelligence 
valu concerning the ULATT is available ia these reports. 


1. The ATIC Interrogation Reports, wumherod 1 to 93 (the last 
dated Decemier, 1950), present significant information ой a break 
variety ef subjects amd areas where witmessos wore dotaimcd subscquomb 
to the »ostel9l7 imcidemt. The us-published documents oewpltIXUS records: 
of imterrogatiom derived from the accumulated reports ow interviews of 
selected witnesses from New Mexico amd military persomaol ixvolved ia t: 
removal of evidence. | 

МИР e d , e 

2, Im this(digest, primary attention has been paid to iaformation t m 
of bio-medical intelligence interest, particularly іл the ВН programs, Шаа 
Dio-medical iatelligence із only one of the substaativo fields: соусгой ETUR 

e by these Interrogation Reports. г 


$. For the most part, the sources: interrogated wore mot trained 
observers, and their stories indicate they have been subject to the 
familiar pitfalls common to all eye witaesses. It must be emphasized 
that, because the imdermzgators used were mot always specialists Та 
this phenomena of celestial scleaces, there is much lack of detail, 


R. Because of the umione matura. а? the material nadar study, до... 


ва іс а frac -0i- mulii-laysrew security structure has be 
arch and development labs for results have beer given to private rese 
mE и further study, — — — 

we n 
лей om Psy-Oy дететортенЬ for MAJESTIC. SS&P Ан curremtly Гос 


Cold War СТ activities. 


— 


/ 
ilista has yielded valuable | e Utilization of Paperclip зрес!: 
із of flight dymamics, biological results ix жеж weapons research im аге: 
intelligence gathering techmiques, and chemical agents, mind control, ant 
-- 
| БЕ a s 


333 / 569 317 / 340 333 / 570 


Because of the wainne mature АҒ the material падат ahidy, x. 


lui-Layere Tatras Бате has beam 15 arfact, Host. о? 
‘results һата been giver to private research amd də “dovo lopment ded for 


further study. — — — 


А ^ 
5. MAJESTIC. SSP are currently focumd om Ps developnest for 
Cold War СТ activities. -— TN 


в, Utilisation of Paperclip specialists has yielded valuable 


results ій жем weapo im areas of flight dymamics, biological 
ami chemical agents mini co — Тал at intelligence gathoring techniques, 


| GN. NOTE. ‘Operation Paperclip' brought scientists and researchers from Germany after the WWII. 1500 

persons in total, and about 100 came later to work with civilian spacerelated research. These specialists mentioned ES 

in this document above, ( in paragraph 6 ), must have be contracted from the, in total, 1400 person University pile 

that not ended up in NASA. 1500 people was taken from Germany with the intent of using their skills in U.S.A. If p — 

you like to dig deeper in it, more information are available at the U.S. Army Intelligence And Secur ity Command. | Lum Pa, 


34 / 569 318 / 340 334 / 570 


Po 
% iiim 


B, Panel's: Comtributiom ta MAJESTIC 


1. The contribution of the President's Special Panel to the 
MAJESTIC TWELVE PROJECT has supplemented informatior ox the UIATT 


Program which eeuld not bo ebtained ix amy other way, Altheugh ealy 
а small part ef the preject, inmterregatiem За technical aad bio-medical 
field has preduced at leas 8,273 items. fer the files ef Military 
Intelligence, GHC/IPU, Of these items, | 2,764) в have baan published (up te 
December, 1950) in the ULATT KXPLOITATI JESTIC SERIES, The coverage 
ef the Ием Mexice incidents, frem the over-all intelligence peint ef 
view, has been very geod, (After the Panel's review маз initiated, 
QHC/IPU published Та March 1951, two summary "MAJESTIC SERIES," Ме. 98 
amd Me, 99, ef the seriés titled "Мем Medical Facilities fer Bielegical 
poor а Мем Genetic and Pharmaceutical Development: Pregrams.* These 

о rie have apparently made ef much ef the AIC file material 
sia кунин ЙО items are жом reported as published "Medical Items" im іле 
"Imaterregatiem Reports” - see MAJESTIC SERIES, We, 98, page 1.) 


2. Fer the clarification of published reports or fer elaboratien 
ef the imfermatiem ef fragmentary mature, resert may be had te the ABC _ 
files sf unpublished data as well as te the pessibility of reiaterre- 


& “gating the sources, 


С. Review ef the Military Assessment 


With current deployment obligatiems, treep cemmitments, amd few 
air greups with stand-by fighters with radar capability, tho Joint Chicfs 
are unable at the presemt time, to effect ж complete амі all-encompassing 
defense plam that weuld guarantee the pretectiom and well-functioning ef 
the matiemal political erder, Persemncl, material, амі logistical 
requirements fer such a defomse weuld deplete. curremt reseurcese If such 
a crisis should eccurr--im gevermmemt failure te defend amd assure the 
public's trust, it is the belief ef the Joint Chiefs, that the fellowing 
weuld imsuet insecurity and mistrust; empleymemt of subversive agents; 
infiltration; incitere mt ef diserder амі chaos to disrupt normal ccemeny 
and undermine pepular suppert of gevermment amd its leaders; seizure ef 
authority witheut refereace te the will of the people, 


D, Technelogy 


At present, the ability te recemstruct tha techmology that may 
be eens ahead ef us, the boost te eur current efferts weuld be incalculable, 
Areas such ая aircraft and missile design would bencfit enly after w working 
understanding has been achieved, Weapons sciences will fellow. 


ake 


e ает 
G= 


335 / 569 319 / 340 335 / 570 


336 / 569 


Е. Nuclear Wenpens Development 


8, Genetic and Pharmaceutical Deve lopment Pregrams 


Current research im 0.3. amd U.X., cam be accellerated when studies 


Н, Жем Materials Development 


Cenclusiems reached by the Kir Materiel Cemmand im 1918, орем 
tha clese examinatiem ef the material structure ef the Ceremz and Oscura 
Peak, М.М, sites, compelled the Air Ferce te launch x mew machimability 
research pregram, Samples testod and evaluated by the АМО, suggested that 
future materials weuld have te | асегрогабс new alleys and compesites, if 
spaos cxpleration амі hypersemie dynamics are te be achieved, AES а result, 
mew machiwing techniques are underway fer high-temperature alleys and 
titanium, кн 


RR 


320 / 340 


336 / 570 


е р ЧИ 


I, Planned Future Rocket Development Pregrams 


There have been a number ef failed high-altitude гөекеб Launches 

„Ке study radiation effects on living organisms, The Rir Ferce ts Prejeot 

| BLOSSOM, cenducted at Не1] омаж AFB, із but eme example, Ұ-2 recket 
lauxchez at the White Sands Previag Greund, W,M,, have beca kmecked down 
by undetermined Jamming, Тһе seurce ef the jamming is believed te come 
frea UFO sightings on or near the range, Guidance systems are believed 
to bo vulnerable amd this presents a clear and present danger, Such 
keeper flights carrying muclear weapens are tee herrific te contemplate, 
Shielding ef systems and circuits are uaderway. 


Je Nuclear Prøpulsien Deve lopment Pregrans 


The AEC амі МЕРА are currently cemducting research fer advanced 
technologies im atomic engines and radical prepulsiem studies, Systems 
studies at Les Alamos, M.M., Oak Ridge, Temm., and at Lamgoly, Vas, are 
attempting te duplicate the water drive and plastic cere clemonts found 
on the engine being kept at HAFB, Imtergratiem ef hyéregem base feuls 
and electre-hydred с technelory, may өрен up fer us development ef 


super-aeredymes with mach 5 capabilities, 


Ф K. Intelligence Gathering and Analysis. 


Based em what is known of the technelogy amd intelligence ef the 
visiters, it is fairly certaim that there will be ether sightings and 
encounters ef a spectacular nature, Аз te purpeso and modus operandi, 
wo are mot certain, but it is clear, that if these visiters had cenquest 
in mind, it would met be difficult fer them, givem their ability te 
pemetratien eur airspace at will, and their ability te jam radie, tele- 
phone, tel vision, and teletype trans le rids. 
So far, reports and sightings are blatant amd deliberate, thus allewing 
our intelligence agencies te gather geed data, Ав te the analyses ef 
such reperts, only a centimueus wave ef sightings amd caceuaters werld- | 
wide, would previde enough data fer ж clear understanding af intent, 


Le Foreign Pelicy and National Seeurity 


То dato, only Great Britain, Camada, and the Seviet Unier, are 
contacted and appraised in the event | imvasiem із cmimemt, It is the 
current pelicy ef the Admimistratien that ne ether fereigm countries 


will be censulted er advised. The national security status ef the 
MAJESTIC operation exceeds that ef the H-bemb deve lopment, 


“ ` 


& ET — 


337 / 569 321 / 340 337 / 570 


е _— Чи 


И. Demestic amd Censtitutiemal Issues 


Im dealing with clear vielatiens ef civie law амі guarantees as 
defined under the Censtitutiem, it has beem discussed ameng members ef 
MAJESTIC TWELVE, that such pretection of individual rights are eut-welrhed 


by the mature ef the threat, Only а declaration ef war er а national — 


emergency, would give the gevermmcnt the pewer te emact martial law sad 
recemd individual rights. 


X. Secial, Religieus and Scientific Reactien 


It has been the downfall ef creat mations amd cultures whom a mew 
reality is mot readily accepted by the nasan. The зәсізі erder was severely 
ravaged by the last world war, with great damage te the religieus degma ef 
"earth withaut end,” thus так ас a government disclesure irresponsible and 
inherently dangereus, The scientific cemmunity would predictably question 
such a reaction as a world suffering from a Buck Regers delerium and attack 
anyone ef their ewn ranks for believing such famatsy, Sciemee itself, may 
underge a traumatic transfermatien, with belief structures in shambles, 
putting the institutions under scrutiny by the l&ymam, thus ereding amy 

9 credibility, Seience would be left with an image of oredulity, 


0. Cold War Development 


This is eme ef the most dangereus phenomenon of the twentieth 
century, Те misidentify a flight of space objects fer actual Russian 
bombers, or te dismiss Russian bombers as phantoms, is the mest idietia 
approach te take, Evem though governments may distrust each other, it is the 
responsibility and oreed of the military and intelligence prefessienal te 
prevent wanton death and destruction of his ceuntry, It is advisable te 
maintain seme form ef direct communication with a hostile enemy befere 
taking false assumptiens af his response if falty data wrengly indicates 
Such, Even using the "Flying Saucer” ruse te create fear and confusien 
ameng your enemies leaders, could result im accidental маг, Sven our carly 


P, Goverment Policy ef Centrel and Denial 


One of the most difficult aspects of controlling the perception im 
the publie's mind ef government attempts of denial and ignerance—is actual, 
-вопъго1 ef the press, Until a clear intent is established with diplomatio 
-relatíens firmly in hand, 1% is the recemendation ef the President's Special 
Panel with cencurrence frem MAJESTIC TWELVE, that a policy of strict denial 


E ef the events surfacing frem Reswoll, Nolo, and any other incident ef such 


caliber, be enforced, А inter-active program ef centrelled releases te the 
; * media, in such fashion te discredit any civilian imvestigatien, be instituted 
| in accordance with the previsions of the 1947 National Secwrity Aot, 
Нона Е 
ДАРЫ а 
ri Атавы wam. 
338 / 569 322 7 340 


338 / 570 


je о _ = 


> LE 


: | 2. Of particular interest te the Panel was Site L-2, lecated at 


Lat. 33-10-31, Long. 106-28-29, аз this site yielded the mest 
material fer analysis, i | 


aves 
` <. 
| 
| 
| 


5./ Lack ef wirimg, fuel systems, cables, motors, hyéraulies, intakes, 
1 22147 exhaust, and surface centrols, strongly suggests that the craft 
P was designed te travel eutside ef eur atmosphere, 


I 6.) The secend craft that impacted at Site 1-3, previded very little 
\ =~ evidence that it tee was similar in design, аз the impact was 

vertical ia nature and at very high speed, It із believed that 

the debris discevered em 2 July 1917, hy а lecal rancher was the 
"T result ef a mid-air cellisiem with аң X-plane (ген HAFB; anether 
M umidentified objects er pessibly cellided with beth, Radar fila 
and tewor logs de met explain the merging ef three radar targets 
prier te cellisien amd subsequent crashes. 


LARA 


КІРІОІТАТІОЯ-МА)55ТІС SERIES Ц, p. 10-102), аз а result e 
damage sustained fren чакома Causose . 


سگ 


339 / 569 323 / 340 339 / 570 


oe m 


P T .. 
cette a, Sre 
2.5 d 
s А 


б. Жл o. en 
— „ бы 


ра 
^ 


xr 

p; 2... 

А С ода 
— en P 


сет ка 


i 


ss 
` 


md 
° چ ب کہ‎ 223-4 Cx رہ پا‎ V ی ر کک و‎ & 7 
1 A ^ A . 
> = 
” 1 : > 
.- VUA 
y^ „ус 
- s 
1% 


340 / 569 


\ с» 


1% 


w iy] т^ 
зА ^ 
> 


. ANNEX A (Cont'd) 
The Panel was cencerned ever the contamination ef several SED 
persenncl upen coming ix contact with debris sear the power | 
plant. One technician was evercemcd and cellasped when he 


‘attempted the remeval ef a bedy, во лаг medical technician 


went) inte а coma four hours after placing а bedy іл a rubber 
wody-bag, 111 feur were rushed te Les Alameg fer observation. 
ІТІ Your later died ef seizurem and prefuso bleeding, 811 four 


wore wearing pretective suits whem they esma im contaet with 


, body fluids frum the eccupamts, | 


э. 


-- 


11, 


12, 


Kutepsies en the feur dead SKD technicians are met cemclusive, It 
is believed that the feur may have suffered frem seme ferm ef 
texin er a highly cemtagious 4050258. Tissue samplos are currently 
being kopt at Fert Detrick, Md. . 


The Panel was alse cencerned with the ынша мы release 
ef radiation ever the state ef Ием Кехісе. А?ТАС detachment frem 
McClellan AFB has conducted several airberne moniter flights ever 
Site L-J, Radiatiem readings indicate а high meutren count was 
recerded as the plane flew ever the site, Meutrem ceunt drepped 
eff as tho plane flew а cemsiderable distance frem the site, À 
repert has booa filed with the USASDS, / 
Detection ef a high altitude explosiem was recorded by a Preject 
MOGUL censtant level ballees өй L July 1917, Radar frema White 
Sands Preving Ground амі НАГЗ also detected a surge. 


Parachute recevery team frem НАРВ were dispatched te Site L-2. 
Урта arrival, the team, realising the mature ef the crash, 
radieed imstructiens amd marked crash site fer the investigaters 
that arrived later. 


(335 Та the epiniom ef the semier AEC medical efficer, owrrent medical 
N o 


equipment and supplies аге wholly inadequate in dealing with в 
largo scale outbreak ef the alten viruse 


Facilities at Les Alames amd Maye clinies were considered as 
lacking im tha curremt climate, 


(On 26 Septenber 1947, the first meeting ef the И5С-1 was held 
-te discuss the Kew Maxice incidents амі hew te implement the 
policy established by MJ-12 5552, 


-3- 


324 / 340 


340 / 570 


341 / 569 


1. AJESTIC IWELKYI E 
^-^ executive erder dated 2l, September 1917, and giren ремего ef 


€ 


z. 


lea 


Se 


Te 


m 
9. 


3-5 
<-> < 


ют 


| Upen the creation ef the MAJESTIC TWELKVE GROUP by special 
autherity by ?DO/L-1, dated 26 September 1917, the Panel was 
empewered te Convene and cemduct a review ef all available 
evidence and data cellected by gevermment and military 
1212111688608 agencies, 


Because ef the unique nature ef the 1917/45 crisis, the Panel 
recemwemded ta MAJCOM-] that the authority ef the Secretary ef 
Defense be ixveked in order te implem xb XSCID Ne, 3/1. . 


A meeting wmm held еп в December 1917, between CIA and ПС 
eencermimg the IAB, Dr, Vannevar Bush, Chairmam ef the lamel, 
requested the ОСТ te eonvey the eemtemts of a letter frem Dr, _ 
Bush te Secretary Forrestal, thus breaking the deadleck ever 

issues cemcerning autherity and policy making doalimg with tho 

New Mexice imciéemts and subsequent expleitatiem ef tho finds. 

Om 13 January 1948, the MSC, with input from the Panel recemmended 
“te the President, that "third party greup frem eutside ef the 
Gevermment be ablished fer the purpose of conducting в impartial 
and objective” y ef the activities and personnel of the CIA, 


18 а result of the DCI's lack ef timely intelligence estimates amd 
poer coordination of intelligence activities fer MAJESTIC the MSG 
Survey Orevp issued its findings. kt the suggestion ef the Pamel 
Chairman, the IAC met en 16 June 1948, at which the cenclusiens ef 
the Survey Greup were reviewed, 7 


On 18 Pebruary 1919, the IAC met for the purpose ef proposing some 
changes ie аси draft proposal en MAJCOM activities, 


General Jeseph McNarney, with the assistance "ef Carlisle Nomelsine 
and Robert Blum, prepare NSC 50/1. On 7 July 1919, the KSC adopted 
the recemmendatiens ef NSC 50/1 which directed the DCI te enlist 


the activities ef the IAC in MAJESTIC intelligence activities. 
MAJCOM-l meets with the Prosidemt im May 1950. 


Admiral Hillenksetter leaves position аз DCI en 7 Octeber 1950. 


10, MAJCOM-l with assistance ef the Panel persuades the President to 


establish the Psychological Strategy Beard on ls April 1951. 
-10- ` 


——————— 


325 / 340 


341 / 570 


® == i 
ANNEX В (Cont'd) B 


11. Panel member and MAJCOM-l, meet with MAJCOM-l оп-10 Octeber 1950: 
along with members ef ис. Tha Chisf ef Global Survey Oreup 
desired estimates requested by the Pentagon concerning possible 
defense project for MAJESTIC 10015716 552-1. 


12, On( December 1950, MAJCOM-l, alerta MAJCOM-l ef а breach in DEW 
Üreenland of а UFO en a seuth-wosternly ceurse. HQ IPU alerted J 
and dispatched а scientifico team te БІ Indie—Guerrere on the | 2 


crash site te ADC НАТР and te АЕС laboratories at Sandia, Мом 


12. MAJCOM-l enlists the Panel's aviation censultanta fer the purpese 


.. Om 28 December 1950, MAJCOM~1 is provided with the "Black Boek" vs 
summaries prepared by the Watch Committee, Begiming avory Friday 
the President is briefed on world situation and en MAJESTIC via 
the CIA weekly Current Intelligence Revicw. 


Э 15. kt the request ef Panel member Cardinal Francis Spellman, met 
with the President te disouss the centaiument within the 
Саёһо11а Church and its hierchy of religieus speculatien if 
mass sightings occur. Such contaimment was successful during 
the 1917 sightings when Cardinal Spellman met with the 

Secretary ef War en 29 June, Tho President has boen briofed 

„7 en Defense Plan 12, which was written in part by the Panel 

member, 


/ 


17, Atemic engines for aircraft built here om earth faces many 
difficulties because of size and weight ef the reactor and 


radiatien shielding, Such a nuclear power plant weuld give 
ал aircraft unlimited range, 


18. Panel members contributed to the writing of ULATT EE 
MAJESTIC SERIES 5 title Hypersonic Small-Disturbance Theory, 
which gives consideration Lo a three-dimensional body fixed im 
а steady, uniferm, hypersonic stream, The theory assumes that 
shock waves can be approximated by abrupt discentinuities and 
$9 the planform bedy being thin, so that the slope ef the local 
surface in the stream direction im umiformally small. 


342 / 569 326 / 340 342 / 570 


| е : KAMEI X (Cont'd) 


19. МХОМ, а member ef the Panel was instrumental ix supporting the E 
the creatien of the Air Force's Sciontific Advisory Board which P» 
MAJCOM-5 endorsed, B. 


20. МАЈСОМ-5 recemmended te the Air Force Chief of Staff, that the 
Top Secret repert Where We Stand, be the basis fer ULATT develep- 
ment. MAJCOM-5 urged the COS ta enact the ideas of another report 
Science, the Key te Air Supremacy, Major General Curtiss LeMay Е 
Stall Directer of Research and M lid secended MAJCOM-5 а, E 4; 
views, 


21. The Panel Chairman argued Гог funding fer air defense prejeets i 
that would be useful im cembating the new menace instead ef 
developing ballistic missiles, which have preved te be useless, 


22. Оа Jume 15 1917, Dr. Theedore vem Karman chaired the first 
meeting of the SAB and discussed hew the Air Forces could 
| propare fer x possible air attack im light ef the mmereus UFO 
| sightings ever the 0.5. 


23. On ih May 1918, MA JCOM-l, arranged fer the premulgatien ef Air 
8 Feroce Régulation 20-30, which restered the pewers ef the ЗАВ 


az agreed upon by Karzan and LeMay іп 1916. 


25. MAJCOM-h had а prepared speech read at a meeting of scientific 
aévisers en 7 April 1949, highlighting вем Air Feree B&D 
erganisatien and structures ап UFO researeh fer ULATT, ‘Karman 
enlisted the aid ef a Panel member te persuade MAJCOM-l, to 


endorse a seperate establishment free frem AMC and lemtagem 
сөпіге1, 


25. Оп 2 January 1950 ж plan was presented te the Air Staff Coumcil 
fer seperate RUD fer ULATT, 


26. 04.24. January 1950, Research and Develepment Cermand амі the 
A 


“Starr Deputy Chief ef Staff fer Research and Develepmemt 
was created, 


21. та May 1951, Panel member MAJCOM-l, endorsed Karman's creation 
ef LUDW and his presentatien at tho Pentagon ef а lecture 
called "Mebilisatien ef Sciemtific Effert im Westorm Гогороаж 


| Countries." ; 
( -22- 
1 - 
1 - 
i == 
| 
‚ 9 
1 
| 1 
лз сс ЫШТЫШ RR Eon EE EN инт 
аа г к ө. alit MUN ARR. دی ےہ بد‎ 
343 / 569 327 / 340 


343 / 570 


344 / 569 


3. 


ANNII C 


— .. 


with repeated, unexpected blown. Such в defense cam werk, 
only when the enemy із detected, his strength known, his 
EE identified, amd, his tactics and mevexenis are ro- 
ve 


ir 
жоарФПз and equipment (herses imeluded), Im 1885, abeut 600 


Nanking, Again, mon, equipment, runs, were missing though 

OG mp fires and mess tents were undisturbed, During the Pacific 
campaign, there have been instances where whele platoons and 
larger units Scomed te have disappeared witheut any sign о? 
Cenbat er а struggle, Men, equipment, weapons--vanish without 
a traco, In all instances the disappearances: eccurred in 
trepical climate and in the heat of battle er near cembat 
Senes, 


Missing alreraft, pilots and crews, are ef special concern 

te the military when no explanatiens fit the usual reasons 
outside of combat, One such incidant is the disappearance ef a 
flight of five U,S, Kary ТВМ-3 Avenger torpedo bombers fren 
NAS ria on 5 December 1915. While mo explanatien aa 
to why navigation instruments on all five aireraft could have 
failed at the same time, and efferts te rescue the lh creunen 
were unsuccessful, it is believed that Flight 19 encountered а 


at 2,300 feet, Den't сете after ша,” After ene of the most intensive 


air-sea rescue operations in U.S, naval history, the Naval Beard of 
UT said, ag were not able to make even a кее guess as te what 
appened. 


-13- 


—MÀ— 


328 / 340 


344 / 570 


345 / 569 


h. 


6, 


m — — "Hu 


- ANNEI C (Cent'ë) 


Om 7 January 1918, а ANG F-51 pilot was lest near Gedman AFB, 
Kentucky, After being directed te lead his flight of feur F-5ls 
by the tewer, Captain Thomas Mantell pursued m large metallic 
object alone after two pilots returned te Godman AFB, and finally 
his wingman was ordered te return te the field, It is belimwod 
that Mantell was fellowing & large, structured object not in the 
flight path of а classified Navy SKTHOOK balleon, Mantell radiesd 
Godman tower that he was at 27,000 feet and still climbing. At 
one point Mantell said that the object had paced his aireraft for 
several mimites, then would speed up, His last transmission te 
the tower was, "It appears te be a metallic object , , , and it 
is ef tyemendous sizo , , , It appears to be m metallic object 
or pessibly the reflaction of sun from а metallie sbjaet," When 
personnel arrived at the crash scene, Mantell's F-51 

was feund in many pieces, not large sections as ome would find 
frm а free stick deactm$ The wreckage contained unusual damage 
as 1f Mantell's plane маз repeatedly hit by shetgun blasts, 

Sone ef the metal had pitted surfaces and umusual scoring. All 
rubber material had disintegrated im » soft powdery substance, 
There was no indicatien ef gunfire damage ew feul burn, Тһе 

crash site and debris exibited an unusually high ameunt of 
rTadiatiemof undetermined nature, The site was cleared of debris 
and cevered, Mantell's plane was subsequently sent te Wright- 
Patterson AFB, Ohie for examinatiem, А autopsy was cenducted on 
the body and interned in storage for future study. It is believed 
by the Air Feres investigaters that Mantell's Plane had been 
destreyed by a ienisatien phenom man, possibly frem tho propulsion 
wash of the ebject's exhaust, 


Frem 1919 te late 1950, there have been several crashes ef 5-36 


^ bombers on routine artic patrol that bear all the earmarks of the 


Mantell incident, None ef the crews: were feund, The atomic bombs 
мего net recovered, thus creating а serieus problem fer the Air 
Ferce when nuclear weapons are lost over friendly countries, 


The death of tue Air lorca ceunterimtelligemos efficers in the 
crash of their B-25 aireraft enreute to Hamilten AFB, Califernia, 
after interviewing two auxiliary 00 men whe reported six UFOs ever 
Maury Island, Washington, in June 1747. CIC agent Crisman had 
spoken te Kenneth Arneld, whe on 26 June 1947, had reported а 
flight of UFUs over МЕ. Rainier, Washington, and filed his report 
after he had spoken te Captain Davidsen and Lieutenant Brow, 

The material given to Davidson and Brown was believed to come 

frem Maury Island and mày be celestrial fragments containing 
metal frem a nuclear reacter frem & UFO, Fragments were turned 


ever to CIA agent Shaw, and Crioman was ordered te the Alaskan 


ADC for assignment in Projoct 171, 
سا[‎ 


= 


329 / 340 


345 / 570 


AMEX C (Cont ға) 


7. Aerial interference with military aircraft has demenstrated the 
ability to ebserve our air operatiens im war and peacetime 
conditions, During the war over ЖО ncar-miss incidents мега 
reported by allied pilots and crews in all theater ef operations,» 
One of tha most dramatic near-miss encounters occurred on Ш 
October 1943, Sth AF Missi n 115 over Schwienfurt, Germany, В-17 
crews reported many fornat of silverly discs flying down iato 
the B-17 fermations, Several times during the bombing missien, large 
objects were seen following the discs descent into the formatiens, 
Unlike previous reports, no engine failures or airframe damage was 
reported. After the surrender of Masi Germany, GAF fighter pilets 
were interregated by AP intelligence concerning Missien 115, Gar 
did not have any aircraft above our bombers at that time, 


8, On 2 August 1916, a C-l7 piloted by Captain Jack Е, Puckett, 
Assistant Chier ef Flying Safety fer TAC, experienced a near-miss 
of а eylindrical-shaped aircraft about 100 meters im length, The 
incident eccurred at an altitude of 4,000 feet, northeast of 
Tampa, Florida. Just 1,000 yards en a cellisien course, the UFO 
flipped ever Sideways, cressing the flight path of Риске Из 
С-17. Three other crew members ebserved the UFO and described it 
аз being over twice the length of a B-29 and cylindrical in 
Shape with luminated windows, Observers en the С-ЦТ reported a 

9 stream ef fire trailing the ebject, The егет and Puckett watched 
the UFO for ever three minutes, TAC radar statiens had tracked 
а large target approaching the С-Ц7 and them Performed a right- 
angle ceurse change while flying at spends ef axcesg of 600 mph, 


9. On 1 October 1948, а АКО F.c] pilot engaged a blinking lunimus 
UFO in a dogfight-style encounter over Farge, North Daketa, 


20. On 2h April. 1919, engineers and technicians from the White 
Sands Proving Greund observed a elliptically-shaped object 
moving in a eastward course at very high altitude, The ob- 
ject was discevered while tracking a Skyhook balloon through 
a theodolite, The object appeared whitish in celor and pale 
yellow at the tail end. The ebjeot was estimated to be two- 
and-a-half times as long аз it was wide. It маз difficult te 
seo any structure of the 9bject as it was moving at a very 
high speed, The object was observed through a theodolite fer 


346 / 570 
330 / 340 
346 / 569 


т e Т 
ANNEX C (Cont'a) 


11. Frem 19 to carly1951, our atomic bemb and ceapenent plants 
have beon the target of UFO reconnaissance. Of late, our МЕРА 
projects are of special attention te the visiters, During 
seme ef the flights » radiatien levels have risen sharpely, 


а 


then drepping suddenly to normal. In come instances lutenium 
production has been halted due te contamination ef plant 
personnel during these sightings ef lew-level flights. 
12, ( On 25 October 1950) the Superintendent of Security, Oak Ridge, 
filed a security report for I-10, Me stated that a round ebject, 
about ten fect in n diameLer, burmished yellow ін color, hung lew 


ever the Control Zena. The ebject would move slightly frem ono 
side to tlie other and emit а low hum sound, 


13. £ On 24 October 1950) the Assistant Chief of Security, NEPA 
i Division, Oak Ridge » Observed a similar ebject near the 
f restricted area (Restricted Fying Zone), The ebject emitted 


а varying color ef light frem red to green, to blue te 
orange, This sighting was confirmed by a Air Force efficer 


if alse of НҰРА Divisien, Oak Ridge, Radar from Knoxville 

е Airport tracked several slow moving targets flying ever the 
тА Southeast seetor of the "Restricted Zone". Fighters were 

К. Vectered to the radar targets but the pilot reported no _ 


Er 

PE visual contact, _ 
1 

| 


lh, Naval aircraft with nuclear weapons delivery capability have 
reported a sudden drop in nentren counters, Aircraft carrier 
E storage of nuclear weapons have also reported unusual meutren 
n counts. During recent MATO naval maneuvers, the USS Franklin 
D, Roosevelt has been trailed by numereus UFOs Гог leng perieds 
on-and-off since 1950, ; 


CONCLUSIONS : 


The future of American citisens and the world for that matter are 
jeopardized today by developments аз pertentious as those leading 


te World War II, Givén the growing challenge from the Soviet 
Union and her satellites and the intrusion of extraterrestrials, 
the United States is compelled, therefore, te initiate realistic 
lines of actien te protect United States strategic interests. 


RECOMMENDATIONS ¢ 
—— Ó— ——— нні 


It is recemmended: 
That the United States Government provide as early as practicable 
meral, advisory, and material support te the MAJESTIC-12 Project 
‘in order to contribute te the ‘early establishment of peace in tho 
World in censonance with the enunciated principles ef the United 
Nations, and to protect United States strategic interests against 
ferces which now threaten them. 277 


-16- 
—— A а т сее ЦНИИ 


347 / 569 331 / 340 347 / 570 


«See rs. 


348 / 569 332 / 340 348 / 570 


«See rs. 


349 / 569 333 / 340 349 / 570 


SECUR 


351/569 335 / 340 351/570 


360 / 569 


a» United States Patent 


US006587729B2 


(10) Patent No.: US 6,587,729 B2 


O’Loughlin et al. (45) Date of Patent: Jul. 1, 2003 
(54) APPARATUS FOR AUDIBLY (58) Field of Search ......................... 332/167; 381/151; 
COMMUNICATING SPEECH USING THE 607/56, 55; 340/384.1; 600/559, 23, 586; 
RADIO FREQUENCY HEARING EFFECT 128/897, 898 
(75) Inventors: James P. O?Loughlin, Placitas, NM (56) References Cited 
(US); Diana L. Loree, Albuquerque, 
NM (US) U.S. PATENT DOCUMENTS 
(73) Assignee: The United States of America as 3,563,246 А * 2/1971 Puharich et al. .............. 607/55 
represented by the Secretary of the о A * — ue еи et al. .............. : эс 
Ё җе ‚835, * aou! 
Air Force; Washington, DC (US) 5.450044 A * 9/1995 Hulick 332/103 
(*) Notice: Subject to any disclaimer, the term of this t ей by examiner 
patent is extended or adjusted under 35 y 
шама by 0days: Primary Examiner—Kennedy Schaetzle 
(21) Appl No.: 10/131,626 (74) Attorney, Agent, оғ Firm—James M. Skorich 
2 ppl. No.: m 
57 ABSTRACT 
(22) Filed: Apr. 24, 2002 Bg 
я P A modulation process with a fully suppressed carrier and 
(65) Prior Publication Data input preprocessor filtering to produce an encoded output; 
US 2002/0123775 A1 Sep. 5, 2002 for amplitude modulation (AM) and audio speech prepro- 
cessor filtering, intelligible subjective sound is produced 
Related U.S. Application Data when the encoded signal is demodulated using the RF 
Hearing Effect. Suitable forms of carrier suppressed modu- 
(62) Division of application No. 08/766,687, filed on Dec. 13, lation include single sideband (SSB) and carrier suppressed 
1996, now Pat. No. 6,470,214. amplitude modulation (CSAM), with both sidebands 
(51) Int. Cl.^ sss H03C 1/54 present. 
(52) U.S;CL en 607/55; 128/897; 332/167; 


381/151; 600/586 


AUDIO 
PREDISTORTION 


а() As (f) 


11 Claims, 3 Drawing Sheets 


32 


SQUARE HOOT 


FILTER 
As (f) 


(a(t) As (f)+A) 


PROCESSOR 


L 
2 


J 


BALANCED 


(a(t) As (0+А)2 sin (At) 


1 


SPHERICAL 


MODULATOR 


DEMODULATOR 


ACOUSTIC 


BRAIN 


360 / 570 


U.S. Patent Jul. 1, 2003 Sheet 1 of 3 US 6,587,729 B2 


Signal 


RF 
Signal 


361 / 569 361/570 


362 / 569 


U.S. Patent Jul. 1, 2003 Sheet 2 of 3 


AUDIO 

a(t) | PREDISTORTION a(t) As (f) 
FILTER 
As (f) 


SQUARE ROOT 
PROCESSOR 


L 
2 


(a(t) As ()+А) 


j 
? 


(a(t) As (f)+A) 


BALANCED sin (2,1) 


MODULATOR 


SPHERICAL 
DEMODULATOR 


ACOUSTIC 
BRAIN 


на. 3 


US 6,587,729 B2 


362 /570 


U.S. Patent Jul. 1, 2003 Sheet 3 of 3 US 6,587,729 B2 


DEMODULATOF 


44 

43 ma 
чи SPHERICAL | 

4 1 


/ 


ACOUSTIC 
BRAIN 


FIG. 


363 / 569 363 / 570 


364 / 569 


US 6,587,729 B2 


1 


APPARATUS FOR AUDIBLY 
COMMUNICATING SPEECH USING THE 
RADIO FREQUENCY HEARING EFFECT 


This application is a division of U.S. patent application 
Ser. No. 08/766,687 filed on Dec. 13, 1996, now U.S. Pat. 
No. 6,470,214, and claims the benefit of the foregoing filing 
date. 

The invention described herein may be manufactured and 
used by or for the Government for governmental purposes 
without the payment of any royalty thereon. 


BACKGROUND OF THE INVENTION 


This invention relates to the modulating of signals on 
carriers, which are transmitted and the signals intelligibly 
recovered, and more particularly, to the modulation of 
speech on a carrier and the intelligible recover of the speech 
by means of the Radio Frequency Hearing Effect. 


The Radio Frequency (“RF”) Hearing Effect was first 
noticed during World War II as a subjective “click” produced 
by a pulsed radar signal when the transmitted power is above 
a “threshold” level. Below the threshold level, the click 
cannot be heard. 


The discovery of the Radio Frequency Hearing Effect 
suggested that a pulsed RF carrier could be encoded with an 
amplitude modulated (“АМ”) envelope. In one approach to 
pulsed carrier modulation, it was assumed that the “click” of 
the pulsed carrier was similar to a data sample and could be 
used to synthesize both simple and complex tones such as 
speech. Although pulsed carrier modulation can induce a 
subjective sensation for simple tones, it severely distorts the 
complex waveforms of speech, as has been confirmed 
experimentally. 


The presence of this kind of distortion has prevented the 3 


click process for the encoding of intelligible speech. An 
example is provided by AM sampled data modulation 


Upon demodulation the perceived speech signal has some 
of the envelope characteristics of an audio signal. Conse- 
quently a message can be recognized as speech when a 
listener is pre-advised that speech has been sent. However, 
if the listener does not know the content of the message, the 
audio signal is unintelligible. 


The attempt to use the click process to encode speech has 
been based on the assumption that if simple tones can be 
encoded, speech can be encoded as well, but this is not so. 
A simple tone can contain several distortions and still be 
perceived as a tone whereas the same degree of distortion 
applied to speech renders it unintelligible. 


SUMMARY OF THE INVENTION 


In accomplishing the foregoing and related object the 
invention uses a modulation process with a fully suppressed 
carrier and pre-processor filtering of the input to produce an 
encoded output. Where amplitude modulation (AM) is 
employed and the pre-processor filtering is of audio speech 
input, intelligible subjective sound is produced when the 
encoded signal is demodulated by means of the RF Hearing 
Effect. Suitable forms of carrier suppressed modulation 
include single sideband (SSB) and carrier suppressed ampli- 
tude modulation (CSAM), with both sidebands present. 

The invention further provides for analysis of the RE 
hearing phenomena based on an RF to acoustic transducer 
model. Analysis of the model suggests a new modulation 
process which permits the RF Hearing Effect to be used 
following the transmission of encoded speech. 


10 


15 


40 


50 


60 


2 


In accordance with one aspect of the invention the pre- 
processing of an input speech signal takes place with a filter 
that de-emphasizes the high frequency content of the input 
speech signal. The de-emphasis can provide a signal reduc- 
tion of about 40 dB (decibels) per decade. Further process- 
ing of the speech signal then takes place by adding a bias 
level and taking a root of the predistorted waveform. The 
resultant signal is used to modulated an RF carrier in the AM 
fully suppressed carrier mode, with single or double side- 
bands. 


The modulated RF signal is demodulated by an RF to 
acoustic demodulator that produces an intelligible acoustic 
replication of the original input speech. 

The RF Hearing Effect is explained and analyzed as a 
thermal to acoustic demodulating process. Energy absorp- 
tion in a medium, such as the head, causes mechanical 
expansion and contraction, and thus an acoustic signal. 

When the expansion and contraction take place in the 
head of an animal, the acoustic signal is passed by conduc- 
tion to the inner ear where it is further processed as if it were 
an acoustic signal from the outer ear. 

Тһе RF to Acoustic Demodulator thus has characteristics 
which permit the conversion of the RF energy input to an 
acoustic output. 


Accordingly, it is an object of the invention to provide a 
novel technique for the intelligible encoding of signals. A 
related object is to provide for the intelligible encoding of 
speech. 

Another object of the invention is to make use of the 
Radio Frequency (“КЕ”) Hearing Effect in the intelligible 
demodulation of encoded signals, including speech. 

Still another object of the invention is to suitably encode 
a pulsed RF carrier with an amplitude modulated (“АМ”) 
envelope such that the modulation will be intelligibly 
demodulated by means of the RF Hearing Effect. A related 
object is to permit a message to be identified and understood 
as speech when a listener does not know beforehand that the 
message is speech. 

Other aspects of the invention will be come apparent after 
considering several illustrative embodiments, taken in con- 
junction with the drawings. 


DESCRIPTION OF THE DRAWINGS 


FIG. 1 is a block diagram model of RF to Acoustic 
Demodulation Process making use of the Radio Frequency 
(“RF”) Hearing Effect; 

FIG. 2 is a spherical demodulator and radiator having a 
specific acoustic impedance for demodulation using the RF 
Hearing Effect; 

FIG. 3 is a diagram illustrating the overall process and 
constituents of the invention; and 

FIG. 4 is an illustrative circuit and wiring diagram for the 
components of FIG. 3. 


DETAINED DESCRIPTION OF THE 
PREFERRED EMBODIMENT 


With reference to the drawings, FIG. 1 illustrates the RF 
to acoustic demodulation process of the invention. Ordi- 
narily an acoustic signal A reaches the outer ear E of the head 
H and traverses first to the inner ear I and then to the acoustic 
receptors of the brain B. A modulated RF signal, however, 
enters a demodulator D, which is illustratively provided by 
the mass M of the brain, and is approximated, as shown in 
FIG. 2, by a sphere S of radius r in the head H. The radius 


364 / 570 


365 / 569 


US 6,587,729 B2 


3 


r of the sphere S is about 7 cm to make the sphere S 
equivalent to about the volume of the brain B. It will be 
appreciated that where the demodulator D, which can be an 
external component, is not employed with the acoustic 
receptors of the brain B, it can have other forms. 


The sphere S, or its equivalent ellipsoid or similar solid, 
absorbs RF power which causes an increase in temperature 
that in turn causes an expansion and contraction which 
results in an acoustic wave. As a first approximation, it is 
assumed that the RF power is absorbed uniformly in the 
brain. Where the demodulator D is external to the brain B, 
the medium and/or RF carrier frequency can be selected to 
assure sufficiently uniform absorption. 

For the modulated RF signal of FIG. 1, the power 
absorbed in the sphere S is proportional to the power 
waveform of the modulated RF signal. The absorption rate 
is characterized quantitatively in terms of the SAR (Specific 
Absorption Rate) in the units of absorbed watts per kilogram 
per incident watt per square centimeter. 

The temperature of the sphere S is taken as following the 
integrated heat input from the power waveform, i.e. the 
process is approximated as being adiabatic, at least for short 
term intervals on the order of a few minutes. 


The radial expansion of the sphere follows temperature > 


and is converted to sound pressure, p(t), determined by the 
radial velocity (U,) multiplied by the real part of the specific 
acoustic impedance (Z,) of the sphere, as indicated in 
equation (1), below. 


Z,=p.c(kr)/(1+jkr)=p;c ИЛИ.) (1) 


Where: 

po=density, 1000 kg/m? for water 

c=speed of sound, 1560 m/s, in water @ 37? C. 

k=wave number, 2z/wavelength 

r=sphere radius, in meters (m) 

f-audio frequency 

f.=lower cutoff break Недиепсу,=с/(2лг) 

j=the 90 degree phase-shift operator 

The specific acoustic impedance for a sphere of 7 cm 
radius, on the order of the size of the brain, has a lower 
cut-off break frequency of about 3,547 Hertz (Hz) for the 
parameters given for equation (1). The essential frequency 
range of speech is about 300 to 3000 Hz, i.e., below the 
cut-off frequency. It is therefore the Real part (R,) of Z, 
times the radial particle velocity (U,) which determines the 
sound pressure, p(t). The real part of Z, is given by equation 
(1a), below: 


RJ pac(ftf Qo 027) (1а) 


In the speech spectrum, which is below the brain cut-off 
frequency, the sphere S is an acoustic filter which “rolls off", 
Le. decreases in amplitude at —40 dB per decade with 
decreasing frequency. In addition to any other demodulation 
processes to be analyzed below, the filter characteristics of 
the sphere will modify the acoustic signal with a 40 dB per 
decade slope in favor of the high frequencies. 


Results for an AM Modulated Single Tone 


Ап RF carrier with amplitude A, at frequency œw, is AM 
modulated 100 percent with a single tone audio signal at 
frequency œw. The voltage (time) equation of this modulated 
signal is given by equation (2), below: 


V(D=A. sin (o) D(1+sin (6,0) (2) 


10 


15 


40 


50 


60 


4 
The power signal is V(t)? as given by equation (3), below: 


Р(д-А.ДЗАзвіп(ө,)-% cos(205f)-34 cos(20,f)- cos(20,£) 
sin(w3t)+% cos(20,t) cos(20,1)] (3) 


To find the energy absorbed in the sphere, the time 
integral of equation (3) is taken times absorption coefficient, 
K. The result is divided by the specific heat, SH to obtain the 
temperature of the sphere and then multiplied by the volume 
expansion coefficient, Mv to obtain the change in volume. 
Тһе change in volume is related to the change in radius by 
equation (4), below: 


dVIV-3drlr (4) 


То obtain the amplitude of the radius change, there is 
multiplication by the radius and division by three. The rms 
radial surface velocity, U, is determined by multiplying the 
time derivative by г and dividing Бу 2”. The result, U,, is 
proportional to the power function, P(t) in equation (5), 
below. 


U,-0.3535 Рд КМ ДЗ5Н) (5) 


Тһе acoustic pressure, p(t), is given in equation (6), 
below, as the result of multiplying equation (5) by the Real 
part of the specific acoustic impedance, R, (1). 


I(O-RAZ,U,)-R. SU, (6) 


The SPL (Sound Pressure Level) in acoustic dB, is 
approximated as 20 log[p(t)/2E-5]. The standard acoustic 
reference level of 2E-5 Newtons per square meter is based 
on a signal in air; however, the head has a water-like 
consistency. Therefore, the subjective level in acoustic dB is 
only approximate, but sufficient for first order accuracy. 

In a single tone case the incident RF power, P(t), from 
equation (3) has two terms as shown in equation (7), below, 
which are in the hearing range. 


sin(o,£)-!4 cos(20,f) (7) 


This is converted to the acoustic pressure wave, p(t), by 
multiplying by the specific acoustic impedance calculated at 
the two frequencies. Therefore, the resulting pressure wave 
as indicated in equation (8), below, becomes 


p(t)- C[Z.(o,)sin(o,7)—4Z „(20 )сов(2003) | (8) 


Тһе result 15 an audio frequency and a second harmonic 
at about 1⁄4 amplitude. Thus using an RF carrier, AM 
modulated by a single tone, the pressure wave audio signal 
will consist of the audio tone and a second harmonic at about 
-6 dB, if the specific acoustic impedances at the two 
frequencies are the same. However, from equation (1) the 
break frequency of a model 7 cm sphere is 3.547 Hz. Most 
of the speech spectrum is below this frequency therefore the 
specific acoustic impedance is reactive and the real compo- 
nent is given by equation (8a), below: 


RAZ} =P (f: (Af) (8a) 


Below the cutoff frequency the real part of the impedance 
varies as the square of the frequency or gives a boost of 40 
dB per decade. Therefore, if the input modulation signal is 
1 kHz, the second harmonic will have a boost of about 4 time 
in amplitude, or 12 dB, due to the variation of the real part 
of the specific acoustic impedance with frequency. So the 
second harmonic pressure term in equation (8) is actually 
four times the power or 6 dB higher than the fundamental 


365 / 570 


366 / 569 


US 6,587,729 B2 


5 


term. If the second harmonic falls above the cutoff frequency 
then the boost begins to fall back to 0 dB. However, for most 
of the speech spectrum there is a sever distortion and strong 
boost of the high frequency distortion components. 


Results for Two Tone AM Modulation Analysis 


Because of the distortion attending single tone 
modulation, predistortion of the modulation could be 
attempted such that the resulting demodulated pressure wave 
will not contain harmonic distortion. This will not work, 
however, because of the non-linear cross-products of two- 
tone modulation are quite different from single tone modu- 
lation as shown below. 

Nevertheless, two-tone modulation distortion provides an 
insight for the design of a corrective process for a complex 
modulation signal such as speech. The nature of the distor- 
tion is defined in terms of relative amplitudes and frequen- 
cies. 

Equation (8b) is that of an AM modulated carrier for the 
two-tone case where о); and o, are of equal amplitude and 
together modulate the carrier to a maximum peak value of 
100 percent. The total modulated RF signal is given by 
equation (8b), below: 


V(t)2A, біп(о 21-9 sin(0,,)+% зш(о 201 


The square of (8b) is the power signal, which has the same 
form as the particle velocity, U,(t), of equation (9), below. 
From the square of (8b) the following frequencies and 
relative amplitudes are obtained for the particle velocity 
wave, U,(t), which are in the audio range; 
U (t)-C[sin(o,,£)*sin(o, „д+М4 cos((«,,-«,,)(f) = cos((o, + 
(0,5)£)- Vs cos(20,,0)- s cos(20,51)] (9) 

If the frequencies in equation (9) are below the cut-off 
frequency, the impedance boost correction will result in a 
pressure wave with relative amplitudes given in equation 
(9a), below: 

p(D=C'[sin(o +b? sin(o,,t)«(1-57)/4 соғ(о,-ө, 001-924 
cos((,4--«9,5)0)-34 cos(2,,)t)- 57/2 cos(20,,1) (9а) 
where: b=o,.,/@,, and 0,2»0,, 

Equation (9a) contains a correction factor, b, for the 
specific acoustic impedance variation with frequency. The 
first two terms of (9a) are the two tones of the input 
modulation with the relative amplitudes modified by the 
impedance correction factor. The other terms are the distor- 
tion cross products which are quite different from the single 
tone distortion case. In addition to the second harmonics, 
there are sum and difference frequencies. From this two-tone 
analysis it 15 obvious that more complex multiple tone 
modulations, such as speech, will be severely distorted with 
even more complicated cross-product and sum and differ- 
ence components. This is not unexpected since the process 
which creates the distortion is nonlinear. This leads to the 
conclusion that a simple passive predistortion filter will not 
work on a speech signal modulated on ап RF carrier by a 
conventional AM process, because the distortion is a func- 
tion of the signal by a nonlinear process. 

However, the serious distortion problem can be overcome 
by means of the invention which exploits the characteristics 
of a different type of RF modulation process in addition to 
special signal processing. 


AM Modulation With Fully Suppressed Carrier for 
the Intelligible Encoding of Speech by the 
Invention for Compatibility With the RF Hearing 
Phenomena 


The equation for AM modulation with a fully suppressed 
carrier is given by equation (10), below: 


10 


15 


25 


40 


50 


60 


V(t)-a(f)sin(o,£) (10) 


This modulation is commonly accomplished in hardware 
by means of a circuit known as a balanced modulator, as 
disclosed, for example in “Radio Engineering”, Frederick E. 
Terman, р.481-3, McGraw-Hill, 1947. 

Тһе power signal has the same form as the particle 
velocity signal which is obtained from the square of equa- 
tion (10) as shown in equation (11), below: 


Р(д-С U,-a(t)/2- (a(£)/2)cos(20,1)) (11) 


From inspection of equations (10) and (11) it is seen that, 
if the input audio signal, a(t), is pre-processed by taking the 
square root and then modulating the carrier, the audio term 
in the particle velocity equation will be an exact, 
undistorted, replication of the input audio signal. Since the 
audio signal from a microphone is bipolar, it must be 
modified by adding a very low frequency (essential d.c.) bias 
term, A, such that the resultant sum, |а(О+А1>0.0, is always 
positive. This is necessary in order to insure a real square 
root. The use of a custom digital speech processor imple- 
ments the addition of the term A, i.e. as shown in equation 
(10*), below: 


V(D=(a(D+A)122 sin(o,r) (10*) 


The pressure wave is given by equation (11%), below: 


р(@=С U,-A/2«a(t)/2- (a(0/2)cos(20,1)-(A/2)cos(2«,1) (11%) 


When the second term of the pressure wave of equation 
(11*) is processed through the specific acoustic impedance 
it will result in the replication of the input audio signal but 
will be modified by the filter characteristics of the Real part 
of the specific acoustic impedance, R,{Z,(f)}, as given in 
equation (8а). The first term of equation (11%) is the d.c. 
bias, which is added to obtain a real square root; it will not 
be audible or cause distortion. The third and fourth terms of 
(11*) are a.c. terms at twice the carrier frequency and 
therefore will not distort or interfere with the audio range 
signal, a(t). 

Since the filter characteristic of equation (7) is a linear 
process in amplitude, the audio input can be predistorted 
before the modulation is applied to the carrier and then the 
pressure or wound wave audio signal, which is the result of 
the velocity wave times the impedance function, R,{Z,(f}, 
will be the true replication of the original input audio signal. 

A diagram illustrating the overall system 30 and process 
of the invention is shown in FIG. 3. Then input signal a(t) 
is applied to an Audio Predistortion Filter 31 with a filter 
function As(f) to produce a signal a(t) As(f), which is applied 
to a Square Root Processor 32, providing an output=(a(t)As 
(D-A)'2, which goes to a balanced modulator 33. The 
modulation process known as suppressed carrier, produces a 
double sideband output-(a(t)As(f)2-A)'? зш(о t), where œw, 
is the carrier frequency. If one of the sidebands and the 
carrier are suppressed (not shown) the result is single 
sideband (SSB) modulation and will function in the same 
manner discussed above for the purposes of implementing 
the invention. However, the AM double sideband suppressed 
carrier as described is more easily implemented. 

The output of the balanced modulator is applied to a 
spherical demodulator 34, which recovers the input signal 
a(t) that is applied to the inner ear 35 and then to the acoustic 
receptors in the brain 36. 

Тһе various components 31-33 of FIG. 3 are easily 
implemented as shown, for example by the corresponding 
components 41—42 in FIG. 4, where the Filter 41 can take 


366 / 570 


367 / 569 


US 6,587,729 B2 


7 


the form of a low pass filter, such as a constant-K filter 
formed by series inductor L and a shunt capacitor C. Other 
low-pass filters are shown, for example, in the ITT Federal 
Handbook, 4th Ed., 1949. As a result the filter output is 
AS(f) a 1/2. The Root Processor 42 can be implemented by 
any square-law device, such as the diode D biased by a 
battery B and in series with a large impedance (resistance) 
R, so that the voltage developed across the diode D is 
proportional to the square root of the input voltage a(t)As(f). 
Тһе balanced modulator 43, as discussed in Terman, op.cit., 
has symmetrical diodes A1 and A2 with the modulating 
voltage M applied in opposite phase to the diodes A1 and A2 
through an input transformer T1, with the carrier, O, applied 
commonly to the diodes in the same phase, while the 
modulating signal is applied to the diodes in opposite phase 
so that the carrier cancels in the primary of the output 
transformer Т2 and the secondary output is the desired 
double side band output. 

Finally the Spherical Demodulator 45 is the brain as 
discussed above, or an equivalent mass that provides uni- 
form expansion and contraction due to thermal effects of RF 
energy. 

The invention provides a new and useful encoding for 
speech on an RF carrier such that the speech will be 
intelligible to a human subject by means of the RF hearing 
demodulation phenomena. Features of the invention include 
the use of AM fully suppressed carrier modulation, the 
preprocessing of an input speech signal be a compensation 
filter to de-emphasize the high frequency content by 40 dB 
per decade and the further processing of the audio signal by 
adding a bias terms to permit the taking of the square root 
of the signal before the AM suppressed carrier modulation 
process. 

The invention may also be implemented using the same 


audio signal processing and Single Sideband (SSB) modu- 3 


lation in place of AM suppressed carrier modulation. The 
same signal processing may also be used on Conventional 
AM modulation contains both sideband and the carrier; 
however, there is a serious disadvantage. The carrier is 
always present with AM modulation, even when there is no 
signal. The carrier power does not contain any information 
but contributes substantially to the heating of the thermal- 
acoustic demodulator, i.e. the brain, which is undesirable. 
The degree of this extraneous heating is more than twice the 
heating caused by the signal or information power in the RF 
signal. Therefore conventional AM modulation is an ineffi- 
cient and poor choice compared to the double side-band 
suppressed carrier and the SSB types of transmissions. 

The invention further may be implemented using various 
degrees of speech compression commonly used with all 
types of AM modulation. Speech compression is imple- 
mented by raising the level of the low amplitude portions of 
the speech waveform and limiting or compressing the high 
peak amplitudes of the speech waveform. Speech compres- 
sion increases the average power content of the waveform 
and thus loudness. Speech compression introduces some 
distortion, so that a balance must be made between the 
increase in distortion and the increase in loudness to obtain 
the optimum result. 

Another implementation is by digital signal processing of 
the input signal through to the modulation of the RF carrier. 

What is claimed is: 

1. An apparatus for communicating an audio signal a(t), 
comprising: 


10 


40 


50 


60 


8 


an audio predistortion filter having a filter function As(f) 
for producing a first output signal a(t)As(t) from the 
audio signal a(t); 

means for adding a bias A to the first output signal, to 
produce a second output signal a(t)As(f)+A; 

a square root processor for producing a third output signal 
(a(t)As(f) -A)'? responsive to the second output signal; 
and 

a modulator for producing a double sideband output 
signal responsive to the third output signal, having a 
carrier frequency of о,, and being mathematically 
described by (a(t)As(f)--A)'? sin(w,t); and 

transmitting the double sideband output signal to a 
demodulator, whereby the audio signal a(t) is recovered 
from the double sideband output signal. 

2. The communication apparatus defined in claim 1 

wherein: 

the double sideband output signal has RF power; and 

the demodulator is for converting the RF power into 
acoustic pressure waves. 

3. The communication apparatus defined in claim 2 

wherein: 

the demodulator converts the RF power into the acoustic 
pressure waves by means of thermal expansion and 
contraction, whereby 

the acoustic pressure waves approximate the audio signal 
a(t). 

4. The communication apparatus defined in claim 2 
wherein the demodulator includes a mass that expands and 
contracts responsive to the RE power of the double sideband 
output signal. 

5. The communication apparatus defined in claim 4 
wherein the mass is approximately spherical. 

6. The communication apparatus defined in claim 1 
wherein: 

the double sideband output signal is comprised of a first 
sideband component and a second sideband compo- 
nent; and 

means for suppressing the second sideband component, 
whereby 

the demodulator recovers the audio signal a(t) solely from 
the first sideband component. 

7. The communication apparatus defined in claim 1 

wherein the audio predistortion filter is a low-pass filter. 

8. The communication apparatus defined in claim 7 
wherein the audio predistortion filter is a digital processor. 

9. The communication apparatus defined in claim 1 
wherein: 

the square root processor is a diode biased by a voltage 
source, in series with a resistance, whereby 

a voltage across the diode is proportional to a square root 
of the second output signal a(t)As(t)+A. 

10. The communication apparatus defined in claim 1 

wherein the modulator is a balanced modulator. 

11. The communication apparatus defined in claim 1 
wherein: 

the audio signal a(t) includes a high frequency compo- 
nent; and 

the audio predistortion filter de-emphasizes the high fre- 
quency component by approximately 40 dB per decade. 


* * * * * 


367 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


368 / 569 368 / 570 


М 


ры 


WN 


p 
1 / 
) 
J 
- СА Т 
2 2%; є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


411 / 569 411 / 570 


So what are Extraterrestrials doing here? 

—Here you get a short text summary: 

They fill the tanks with compressed liquid air and fresh water, dump 
the contents of the sewage tank into our waterways and lakes, they 
telepathically influence decisions made within Authorities and 
Governments. They steal containers that contain everything from 
girls' make-up to video game consoles. They conduct biological 
experiments, and they have actively supported the idea of war in 
Ukraine. 


Now is the time to shoot them down. We dont have to put up with the 
above no more. 


! Д 
4 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


412 / 569 412 / 570 


f tte ee = 


Program Acquisition 


Cost By 
Weapon System 


UNITED STATES DEPARTMENT OF DEFENSE 
FISCAL YEAR 2018 BUDGET REQUEST 


414 / 569 


415 / 569 


The estimated cost of this report or study for the 
Department of Defense is approximately $32,000 
for the 2017 Fiscal Year. This includes $13,000 in 


expenses and $19,000 in DoD labor. 


Generated on 2017May03 ReflD: E-7DE12BO 


415 / 570 


416 / 569 


Numbers may not add due to rounding 


FY 2018 Program Acquisition Cost by Weapon System 


Major Weapon Systems 
OVERVIEW 


The combined capabilities and performance of United States (U.S.) weapon systems are 
unmatched throughout the world, ensuring that U.S. military forces have the advantage 
over any adversary. The Fiscal Year (FY) 2018 acquisition funding request for the 
Department of Defense (DoD) budget totals $208.6 billion, which includes base 
funding and Overseas Contingency Operations (OCO) funding; $125.2 billion for 
Procurement funded programs and $83.3 billion for Research, Development, Test, and 
Evaluation (RDT&E) funded programs. Of the $208.6 billion, $94.9 billion is for 
programs that have been designated as Major Defense Acquisition Programs (MDAPs). 
This book focuses on all funding for the key MDAP programs. To simplify the display of 
the various weapon systems, this book is organized by the following mission area 
categories: 


Mission Area Categories 


* Aircraft & Related Systems * Missiles and Munitions 

* Command, Control, Communications, * Mission Support Activities 
Computers, and Intelligence (C4l) Systems ° RDT&E Science & Technology 

* Ground Systems * Shipbuilding and Maritime Systems 

* Missile Defense Programs * Space Based Systems 


FY 2018 Modernization - Total: $208.6 Billion 


($ in Billions) 
Space Based Aircraft & 
Systems Related 
$9.8 Systems 
Shipbuilding & $49.9 c 4l Systems 
Maritime $8.6 
Systems Ground 
$30.4 Systems 
| $11.2 
RDT&E S&T — Missile Defense 
$13.2 Programs 
$9.2 
e Missiles & 
Mission Support Munitions 
Activities $16.4 
$59.9 


416 / 570 


417 / 569 


FY 2018 Program Acquisition Cost by Weapon System 


THE DISTRIBUTION OF FUNDING IN FY 2018 FOR PROCUREMENT AND 
RDT&E, BY COMPONENT AND BY CATEGORY * 
(Dollars in Billions) 


$70 

г Space Based Systems 
$60 

B Shipbuilding 
$50 п RDT&E S&T 


$40 = Missiles/Munitions 
E Missile Defense 

$30 
= Ground Systems 


$20 ш CAI Systems 


$10 B Aircraft 


Army Navy Air Force Def-Wide 


$50 
$45 wi 
$40 E 
$35 pil 
Йя p Po uid 
8 ______ АЛ. К 
МЕ pr Pi- I i а 
$10 ИЕ 
ЧЕ 29993929 
$0 „ЖУ "P ep OD uw ua 
%. о © е o < % о 
` < xe "i oe a «Я SS "i 
v КУ Fd e S کي‎ $ $ 
Ж А) ғ е КЫ 
© 59 2% < 
e 2 3 
+ е 
< 


* Does пої include Mission Support costs 


Numbers may not add due to rounding 


417 / 570 


FY 2018 Program Acquisition Cost by Weapon System 


TOTAL REQUESTED PROCUREMENT AND RDT&E FUNDING DURING 
FY 2018, FOR MDAP AND NON-MDAP PROGRAMS 
(Dollars in Billions) 


MDAP (45.5%) 
Non-MDAP (54.5%) $94.9 


$113.7 


E MDAP 
LJ NON-MDAP 


The FY 2018 President’s budget request for modernization in the RDT&E and 
Procurement titles is comprised of 1,927 Program, Project, and Activity (PPA) line items, 
a portion of which finances the development and procurement of Major Defense 
Acquisition Programs (MDAPs). Many MDAP programs (Acquisition Category (АСАТ) 1) 
are not represented in this booklet because they fall below reporting criteria. 


The purpose of the above chart is to illustrate the share in funding allotted to the MDAP, 
and the non-MDAP efforts. While non-MDAP individual programs are smaller in dollar 
value, they are essential to developing future technologies and procuring a wide 
assortment of equipment, munitions, vehicles, and weapons. The MDAP programs 
consume approximately $94.9 billion, or 46 percent of the FY 2018 modernization 
funding ($208.6 billion). 


Numbers may not add due to rounding 


418 / 569 418 /570 


419 / 569 


FY 2018 Program Acquisition Cost by Weapon System 


FY 2018 FUNDING REQUEST FOR BASE BUDGET & OVERSEAS 
CONTINGENCY OPERATIONS (OCO)* 
(Dollars Represented by Percent) 
100% 


90% т Space Based Systems 


ш Shipbuilding 
| RDT&E S&T 


_ Missiles & Munitions 


80% 
70% 
60% 
50% 
ш Missile Defense 
40% 
m Ground Systems 
3096 
E СА! Systems 


m Aircraft 


2096 
1096 


096 


OCO 


The FY 2018 President's Budget for Investment accounts (Research, Development, 
Test, and Evaluation (RDT&E) and Procurement) totals $208.6 billion, of which 


$197.7 billion is requested in the Base budget, and $10.9 billion is requested in the 
OCO. 


The above graph illustrates the differences in content between the Base and OCO 
budget requests as a percent of funding in each request. Not surprisingly, the OCO 
finances a larger percent of missiles and munitions (yellow) and ground systems 
(orange) than the Base request (63 percent vs. |7 percent). These ОСО funds will be 
used to replenish munitions that were expended in training or combat operations, or 
to replace military equipment that, due to combat operations, were damaged or not 
economical to repair. Also these funds procure critical preferred munitions, which are 
required to increase inventories that are low due to sustained combat operations. 


In the OCO budget the Department is requesting $397.4 million for the procurement 
of 45 aircraft that were lost or damaged beyond repair in combat operations. Іп 


contrast, in the Base budget the Department is procuring various aircraft for 
modernization. 


419 / 570 


420 / 569 


Major Weapon Systems Summary Base осо Total 
($ in Millions) РУ 2016 FY2017 Budget Budget Request Page 
Aircraft and Related Systems - Joint Service 
MQ-IB / MQ-IC Predator/Gray Eagle 490.1 308.1 45.7 128.7 174.4 1-2 
МО-9 Кеарег 1,034.5 1,053.1 662.5 347.3 1,009.8 1-3 
RQ-4 / MQ-4C Global Hawk/Triton/ NATO AGS 1,448.2 1,213.6 1,282.3 - 1,282.3 1-4 
КО-7/КО-11/ RO-20/RO-21 Shadow, Raven, Рита, and Blackjack 281.9 5224 117.4 12.3 129.7 1-5 
С-130) Hercules 2,361.9 1,839.1 886.1 - 886.1 1-6 
Е-35 Joint Strike Fighter 11,560.4 11,323.9 10,837.9 - 10,837.9 1-7 
у-22 Osprey 1,667.6 1,822.4 961.8 - 961.8 1-8 
Aircraft and Related Systems - US Army (USA) 
AH-64E Apache: Remanufacture/New Build 1416.0 1840.4 1402.9 39 1441.9 1-9 
СН-47 Chinook 1,135.0 656.8 415.0 - 415.0 1-10 
UH-60 Black Hawk 1,765.8 1,352.3 1,059.0 - 1,059.0 1-11 
Aircraft and Related Systems - US Navy (USN) / US Marine Corps (USMC) 
E2D Advanced Hawkeye 1,244.0 1,399.6 1,116.4 - 1,116.4 1-12 
H-I AH-IZ Viper/ UH-IY Venom 866.9 844.4 781.8 - 781.8 1-13 
P-8A Poseidon 3,458.8 3,267.4 1,609.4 - 1,609.4 1-14 
CH-53K Heavy Lift Replacement Helicopter 604.5 841.8 1,055.5 - 1,055.5 1-15 
VH-92A Presidential Helicopter 490.8 338.4 451.9 - 451.9 1-16 
F/A-18 Super Hornet 350.0 2,504.9 1,253.1 - 1,253.1 1-17 
Aircraft and Related Systems - US Air Force (USAF) 
PAR Presidential Aircraft Recapitalization 82.4 351.2 434.1 - 434.1 1-18 
LRS Long Range Strike 1,455.6 2,241.7 2,945.4 - 2,945.4 1-19 
F-22 Raptor 518.5 704.4 915.5 - 915.5 1-20 
KC-46A Tanker 2,959.7 3,318.5 3,052.9 - 3,052.9 1-21 
F-15 Eagle 1,002.5 768.5 963.1 - 963.1 1-22 
CRH Combat Rescue Helicopter 150.3 319.3 354.5 - 354.5 1-23 
C4I Systems - USA 
WIN-T Warfighter Information Network — 778.1 461.9 449.1 - 449.1 2-2 
Tactical 
HMS Handheld, Manpack, and Small Form Fit 59.1 292.4 375.5 - 375.5 2-3 
Radios 
Ground Systems - Joint Service 
ту Joint Light Tactical Vehicle 366.2 775.8 1,141.6 ІМ 1,142.7 3-2 
Ground Systems - USA 
AMPV Armored Multi-Purpose Vehicle 213.0 1842 393.5 253.9 647.4 3-3 
FHTV Family Of Heavy Tactical Vehicles 30.8 57.1 92.1 25.9 118.0 3-4 
M-I Abrams Tank Modification/Upgrades 504.7 898.7 632.4 581.5 1,213.9 3-5 
РІМ Paladin Integrated Management 410.3 636.0 652.5 125.7 778.2 3-6 
FMTV Family of Medium Tactical Vehicles 334.0 352.8 84.7 - 84.7 3-7 
Stryker Stryker 1,191.0 735.4 178.2 - 178.2 3-8 
Ground Systems - USMC 
ACV Amphibious Combat Vehicle 197.0 158.7 340.5 - 340.5 3-9 
Missile Defense Programs - Joint Service 
AEGIS AEGIS Ballistic Missile Defense 1,594.7 1,568.0 1,610.6 - 1,610.6 4-2 
THAAD Terminal High Altitude Area Defense 666.6 793.1 718.0 - 718.0 4-3 
GMD Ground-based Midcourse Defense 1,598.0 1,192.7 1,370.4 - 1,370.4 4-4 


2018 


420 / 570 


421 / 569 


Major Weapon Systems Summary Base ОСО Total 
($ in Millions) РУ 2016 FY2017 Budget Budget Request Page 
Missile Defense Programs - USA 
Patriot/PAC-3 Patriot Advanced Capability 363.0 543.0 515.1 - 515.1 4-5 
PAC-3/MSE Missile PAC-3/Missile Segment Enhancement 517.1 702.0 459.0 - 459.0 4-6 
Missile 
Missiles and Munitions - Joint Service 
AMRAAM Advanced Medium Range Air-to-Air 645.4 661.7 594.4 - 594.4 5-2 
Missile 
AIM-9X Air Intercept Missile - 9X 396.2 326.3 296.2 - 296.2 5-3 
Chem-Demil Chemical Demilitarization 699.8 825.5 961.7 - 961.7 5-4 
JASSM Joint Air-to-Surface Standoff Missile 435.6 462.0 471.7 - 471.7 5-5 
JDAM Joint Direct Attack Munition 565.3 778.9 376.8 497.5 874.3 5-6 
SDB Small Diameter Bomb 222.1 4232 413.2 90.9 504.1 5-7 
Hellfire Hellfire Missiles 784.0 685.5 129.7 584.2 713.9 5-8 
Missiles and Munitions - USA 
Javelin Javelin Advanced Anti-Tank Weapon 231.1 292.9 172.4 10.9 183.3 5-9 
GMLRS Guided Multiple Launch Rocket System 287.1 440.6 698.0 191.5 889.5 5-10 
Missiles and Munitions - USN 
RAM Rolling Airframe Missile 99.2 113.7 99.8 - 99.8 5-11 
Standard Standard Family of Missiles 545.7 669.2 684.5 35.2 719.7 5-12 
Tomahawk Tactical Tomahawk Cruise Missile 299.3 403.1 281.5 100.1 381.6 5-13 
Trident Il Trident II Ballistic Missile Modification 1,182.5 1,237.1 1,270.0 - 1,270.0 5-14 
OASUW Offensive Anti-Surface Weapon 348.7 341.5 432.5 - 432.5 5-15 
Missiles and Munitions - USAF 
GBSD Ground Based Strategic Deterrent 65.0 113.9 215.7 - 215.7 5-16 
LRSO Long Range Stand-Off Missile 16.1 95.6 451.3 - 451.3 5-17 
В6! B61 Tail Ки Assembly 204.4 137.9 179.5 - 179.5 5-18 
Shipbuilding and Maritime Systems - USN 
T-AO 205 John Lewis Class Fleet Replenishment 674.1 74.2 543.1 - 543.1 6-2 
Oiler 
CVN 78 Gerald R. Ford Class Nuclear Aircraft 2,768.7 2,791.1 4,638.1 - 4,638.1 6-3 
Carrier 
DDG 5I Arleigh Burke Class Destroyer 4,540.5 3,498.3 4,013.7 - 4,013.7 6-4 
LCS Littoral Combat Ship 1,816.7 1,598.9 1,152.6 - 1,152.6 6-5 
SSN 774 Virginia Class Submarine 5,729.5 5,322.3 5,546.3 - 5,546.3 6-6 
SSC Ship to Shore Connector 218.4 139.2 245.1 - 245.1 6-7 
SSBN 826 Columbia Class Submarine 1,367.1 1,864.3 1,884.5 - 1,884.5 6-8 
CVN Refueling Complex Overhaul 672.6 1,991.8 1,680.8 - 1,680.8 6-9 
LHA America Class Amphibious Assault Ship 497.5 1,648.2 1,748.3 - 1,748.3 6-10 
Space Based Systems - USAF 
AEHF Advanced Extremely High Frequency 535.5 904.7 202.6 - 202.6 7-2 
EELV Evolved Expendable Launch Vehicle 1,475.8 1,803.0 1,861.5 - 1,861.5 7-3 
GPS Global Positioning System 833.1 1,004.7 1,104.2 - 1,104.2 7-4 
SBIRS Space Based Infrared System 834.2 581.3 1,425.3 - 1,425.3 7-5 


2018 


421 / 570 


422 / 569 


FY 2018 Program Acquisition Costs by Weapon System 
Aircraft & Related Systems 


Aviation forces - including fighter/attack, bomber, mobility (cargo/tanker), and specialized 
support aircraft, and unmanned aircraft systems — provide a versatile strike force 
capable of rapid deployment worldwide. These forces can quickly gain and sustain air 
dominance over regional aggressors, permitting rapid attacks on enemy targets while 
providing security to exploit the air for logistics, command and control, intelligence, and 
other functions. Fighter/attack aircraft operate from both land bases and aircraft 
carriers to provide air superiority to combat enemy fighters and attack ground and ship 


targets. Bombers provide an intercontinental capability to rapidly strike surface targets. 


The specialized aircraft supporting conventional operations perform functions such as 
intelligence, surveillance, and reconnaissance; airborne warning and control; air battle 
management; suppression of enemy air defenses; and combat search and rescue. In 
addition to these forces, the U.S. military operates a variety of air mobility forces 
including cargo, aerial-refueling aircraft, helicopters, and support aircraft. 


The FY 2018 Base and OCO funding provides for the procurement of 70 F-35 jets, 
29 logistics support aircraft, 198 helicopters, and 50 Unmanned Aerial Vehicles (UAV). In 
addition, the funding in this category provides for the development of aircraft related 
technology, the procurement of aerospace equipment and systems, various modifications 
to existing aircraft, and the procurement of initial spares. 


FY 2018 Aircraft & Related Systems - Total: $49.9 Billion 


Aircraft ($ in Billions) 
Modification Aircraft Support 


: $7.8 $7.0 
Unmanned Aerial 
Vehicle 
$2.8 
Cargo Aircraft 
Technology 
$3.8 
Development 
$2.6 
Support Aircraft 
$4.9 Combat Aircraft 
$21.0 
Numbers may not add due to rounding AIRCRAFT & RELATED SYSTEMS 


1-1 


422 / 570 


423 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


МО-ІВ Predator / MQ-IC Gray Eagle 


The U.S. Air Force (USAF) МО-ІВ Predator and the ڪڪ‎ 
Army МО-ІС Gray Eagle Unmanned Aircraft au В. 
Systems (UAS) are comprised of aircraft configured я 
with а multi-spectral targeting systems (electro- 

optical, infra-red (IR), laser designator, and IR س‎ 

illuminator) providing real-time full motion video, weapons, data links, and ground control 
stations with communications equipment providing line-of-sight and beyond-line-of-sight 
control. Both systems include single-engine, propeller-driven unmanned aircraft. Special 
Operations Command (SOCOM) divested the МО-І UAS in FY 2015, and the Air Force is in 
the process of divesting the МО-І and replacing all aircraft with МО-9 Reapers. The МО-ІС 
Gray Eagle includes the Gray Eagle Extended Range Engineering Change Proposal (ECP), which 
extends the range and endurance of the aircraft. 


US Army Photo 


Mission: Operates over-the-horizon at medium altitude for long endurance and provides real- 
time intelligence, surveillance, reconnaissance (ISR), target acquisition, and strike capability to 
aggressively prosecute time-sensitive targets. Тһе Army МО-| С Gray Eagle also adds а 
Synthetic Aperture Radar (SAR) Ground Moving Target Indicator (GMTI), a communications 
relay capability, a heavy fuel engine, encrypted tactical common data link, and greater weapons 
capability. 


FY 2018 Program: Funds Test & Evaluation efforts associated with the МО-| Gray Eagle 
Extended Range ECP. The Army plans to procure 11 UAS in FY 2018, which is the last planned 
year of procurement for the МО-ІС Gray Eagle. 


Prime Contractor: General Atomics-Aeronautical Systems Incorporated; San Diego, CA 


МО-ІВ Predator / MQ-IC Gray Eagle 


FY 2016* FY 2017** pce 
Base Budget 00 Budget Total Request 


$M Qty $M Qty $M Qty $M Qty $M Qty 


RDT&E 
Gray Eagle USA 223 - 31.0 - 9.6 - - - 9.6 - 
Procurement - - 
Predator USAF 32 - - - - - - - - - 
Gray Eagle USA 402.1 20 211.1 В 36.1 2 128.7 9 164.8 II 
SOCOM 1.9 - - - - 
Subtotal 461.8 % | Т з 36.1 2 1287 9 1848001 
Total 490.1 20 30811 В 45.7 2 1281 9 1744 II 


Note: Funding includes air vehicles, payloads and modifications 
* FY 2016 includes actuals for Base and OCO 
** FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


AIRCRAFT & RELATED SYSTEMS 


Numbers may not add due to rounding 


1-2 


423 / 570 


424 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


MQ-9 Reaper 


The U.S. Air Force MQ-9 Reaper Unmanned 

Aircraft System (UAS) Program is comprised USAF Photo 
of an aircraft segment consisting of aircraft 
configured with an array of sensors to 
include day/night Full Motion Video (FMV), 
Signals Intelligence (SIGINT), and Synthetic 
Aperture Radar (SAR) sensor payloads, avionics, data links and weapons; a Ground 

control segment consisting of a Launch and Recovery Element, and a Mission Control 

Element with embedded Line-of-Sight and Beyond-Line-of-Sight communications equipment. 
The Reaper is a single-engine, turbo-prop, remotely piloted armed reconnaissance aircraft 
designed to operate over-the-horizon at medium altitude for long endurance. Funding for U.S. 
Special Operations Command (USSOCOM) procures Special Operations Force (SOF)-unique 
kits, payloads and modifications. 


Mission: Provides reconnaissance and embedded strike capability against time-critical targets. 


FY 2018 Program: Funds the continued development, transformation and fielding of Reaper 
aircraft and ground stations. The base request includes the procurement of 10 dual ground 
control stations, and continues the modification of MQ-9s to the extended range configuration. 
The OCO request includes the procurement of 32 additional aircraft, updated multi-spectral 
sensors, and payload modifications. 


Prime Contractor: General Atomics-Aeronautical Systems Incorporated; San Diego, CA 


MQ-9 Reaper 


FY 2016* FY 2017** E 2018 
Base Budget OCO Budget Total Request 
М Qty м Qy м Qy Мо Qy м № 
RDT&E 
USAF 1247 5 151.4 - | 4 Н Е - W4 я 
SOCOM 214 Е 178 : 313 Е я 37.9 + 
Subtotal — 146.1 - 161 - | 2393 Е Р - 0393 Е 
Procurement - - - - 
USAF 8712 3 829.6 24 | 3818 - 375 16 109.3 16 
SOCOM 112 s 543 ще Е 193 Е 61.2 : 
Subtotal 888.4 j 8839 24 4232 - 3473 16 710.5 16 
Total 1,034.5 33 105. 24 | 662.5 - 3413 lN 1,009.8 16 
Note: Procurement funding includes mods, spares and other Numbers may not add due to rounding 


* FY 2016 includes actuals for Base and OCO 
** FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 
1-3 


424 / 570 


425 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


RQ-4 Global Hawk / MQ-4C Triton / NATO AGS КЕ 


pe 


The U.S. Air Force (USAF) RQ-4 Global Hawk, 
Navy MQ-4C Triton, and NATO 
Alliance Ground Surveillance (AGS) 
Unmanned Aircraft System 
programs provide high altitude 

long endurance Intelligence, 
Surveillance, and Reconnaissance (ISR) 

capabilities. Тһе RQ-4 Block 30 includes a multi-intelligence suite for imagery and signals 
intelligence collection, and the Block 40 includes multi-platform radar technology for synthetic 
aperture radar (SAR) imaging and moving target detection. The final three RQ-4 Block 30 aircraft 
will be delivered in FY 2017 and the production line is scheduled to shut down in FY 2018. The 
МО-4С will provide the Navy with a persistent maritime ISR capability. Mission systems include 
inverse SAR, Electro-optical/Infra-red Full Motion Video (ЕМУ), maritime moving target detection, 
Electronic Support Measures (ESM), Automatic Identification System (AIS), a basic communications 
relay capability, and Link-16. Five NATO AGS aircraft are being procured with development 
funding; two will deliver in FY 2017 and deliveries will complete in FY 2018. 


Mission: The USAF and NATO AGS RQ-4 systems perform high-altitude, near-real-time, high- 
resolution ISR collection, while the MQ-4C provides persistent maritime ISR. Both USAF and Navy 
systems support Combatant Commander requirements, while the MQ-4C also supports the 
numbered Fleet commanders from five worldwide sites. 


FY 2018 Program: RQ-4: Funds the development and modification efforts for the Block 30, 
Block 40, Airborne Signals Intelligence Payload (ASIP) Increment Il, various sensor enhancements; 
and the U.S. contribution to the NATO AGS. MQ-4C: Funds the procurement of three Low Rate 
Initial Production (LRIP) systems, and continues to fund development activities associated with 
software upgrades and the multi-intelligence effort. 


Prime Contractor: Northrop Grumman; Rancho Bernardo, CA 


RQ-4 Global Hawk / MQ-4C Triton / NATO AGS 


FY 201 6* FY 2017** да 
Base Budget OCO Budget Total Request 
ым у м (0. и оу м оу $M 05 
RDT&E 
RQ-4, USAF 180.5 - 2563 - 2149 - - - 214.9 - 
RQ-4, NATO 131.9 - 38.9 - 441 - - - 441 - 
MQ-4, USN 351.0 - 293.0 313.5 - - - 313.5 - 
Subtotal — 6694 - 5882 - | 8n. - : - ا53‎ Sel 
Procurement 
RQ-4, USAF 55.1 - 46.2 - 129 - - - 12.9 - 
MQ-4, USN 1231 4 579.2 2 6363 3 - - 636.3 3 
Subtotal — 778.8 4654 2 109.2 3 - - 109.2 3 
Total 1,448.2 4 1,213.6 2 1,282.3 3 - - 1,282.3 3 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


x FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


425 / 570 


426 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Small Tactical Unmanned Aircraft Systems 


The RQ-7 Shadow, RQ-11 Raven, КО-20 Puma, and 
RQ-21 Blackjack Unmanned Aircraft Systems 
(UAS) provide organic Reconnaissance, 

Surveillance, Target Acquisition (RSTA) 

capabilities and are embedded in maneuver 
formations capable of providing crucial 
information to the ground commander. 


Mission: The Army/USMC КО-7 
Shadow and Navy/USMC RQ-21 Blackjack provide 
the tactical maneuver commander near real-time RSTA 
and force protection during day/night and limited adverse 
weather conditions. The Army/USMC/SOCOM multi-sensor 
КО-ІІ Raven and USMC/SOCOM КО-20 Puma provides an "over-the-hill" rucksack-portable, 
day/night, limited adverse weather, remotely-operated capability that supports selected combat 
and combat support units. The multi-sensor КО-21 Blackjack is runway independent, requiring 
minimal space for takeoff and recovery from an unimproved expeditionary/urban environment, 
as well as from the decks of Navy ships. 


Shadow 


US Army Photo 


Blackjack 


Navy Photo 


FY 2018 Program: Funds upgrades to system hardware and payloads for the КО-7 Shadow. 
Procures upgrades and provides training and contractor logistics support for the RQ-I1 Raven. 
Procures RQ-20 Puma systems for the USMC and SOCOM. Procures a total of 4 systems and 
provides contractor logistics support for the RQ-21 Blackjack. 


Prime Contractors: RQ-7: Textron Systems Unmanned Systems; Hunt Valley, МО 
КО-20/КО-ІІ: AeroVironment, Incorporated; Simi Valley, СА 
КО-21: INSITU, Incorporated; Bingen, WA 


RQ-7 Shadow / КО-ІІ Raven / RQ-20 Puma / RQ-21 Blackjack 


FY 2016* FY 2017** — U ааа ааа 
Base Budget OCO Budget Total Request 
шш шалық )уүу/ dd o 0 
RDT&E 24.8 - 233 - 285 - - 28.5 
Procurement 
Shadow/Raven (Army) 812 - 320.6 - - - - - - 
Shadow/Puma (USMC) 13.4 - 193 - 102 - - - 10.2 
Puma (SOCOM) 213 : ES 
Blackjack (Navy) 513 3 10.0 4 0.9 - 39 - 4.8 - 
Blackjack (USMC) 113 3 89.2 4 118 4 84 - 86.2 4 
Subtotal 814 6 4991 8 | 989 4 123 - 102 4. 
Total 281.9 6 524 8 117.4 4 12.3 - 129.7 4 
Note: RDT&E funding is for all three systems across the Army, USMC and SOCOM Numbers may not add due to rounding 


* FY 2016 includes actuals for Base and OCO funding 
** FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO) 


AIRCRAFT & RELATED SYSTEMS 
1-5 


426 / 570 


427 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


C-130J Hercules 


The C-130J Hercules is a medium-sized tactical 
transport airlift aircraft that is modernizing the U.S. 
tactical airlift capability. It is capable of performing a 
variety of combat delivery (tactical airlift) operations 
across a broad range of mission environments including 
deployment and redeployment of troops and/or 
supplies within/between command areas in a theater 
of operation, aeromedical evacuation, air logistics support, 
and augmentation of strategic airlift forces. The C-130] aircraft, with its extended fuselage, 
provides additional cargo carrying capacity for the Air Force combat delivery mission compared 
to the legacy C-130E/H and the С-130) (short) aircraft. Special mission variants of the С-130] 
conduct airborne psychological operations (EC-130]), weather reconnaissance (УУС-130)), 
search and rescue (НС-130)), and special operations (МС-130) and АС-130]). The КС-130) 
provides the Marine Corps with air-to-air refueling/tactical transport capability; airborne radio 
relay; intelligence, surveillance, and reconnaissance; and close air support to replace the KC- 
130 F/R/T aircraft. 


/ 


Mission: Provides responsive air movement and delivery of combat troops/supplies directly 
into objective areas through air landing, extraction, and airdrop, and the air logistic support of 
theater forces. 


FY 2018 Program: Continues the Multiyear Procurement (MYP) for С-130) aircraft from 
FY 2014 to FY 2018, procuring 9 aircraft in FY 2018. 


Prime Contractor: Lockheed Martin Corporation; Marietta, GA 


C-130J Hercules 


FY 2016* FY 2017** RE 
Base Budget OCO Budget Total Request 
$M оу $M Qty $M Qty $M Qty $M оу 
RDT&E 
HC/MC-130 8.6 - 14.0 - 38.6 - - - 38.6 - 
C130) 314 З 16.8 | 26.8 26.8 : 
Subtotal 40.1 - 30.8 - 65.4 - - - 65.4 - 
Procurement 
C-130J 850.6 14 218.7 3 57.7 - - - 57.1 - 
HC/MC-130 1,261.8 13 1,435.9 14 607.9 1 607.9 1 
Subtotal 2,112.4 27 1,654.6 17 665.6 7 - - 665.6 1 
Procurement 
KC-130J 209.5 2 153.7 2 155.1 2 - - 155.1 2 
Subtotal 209.5 22 1537 2 155. 2 : : 155.1 2 
Total 2,361.9 29 1,839.1 19 886.1 9 - - 886.1 9 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-6 


427 / 570 


428 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


F-35 Joint Strike Fighter 


The F-35 Joint Strike Fighter (JSF) is the 
next-generation strike fighter for the 
Navy, Marine Corps, Air Force, and U.S. 
Allies. The F-35 consists of three variants: 
the F-35A Conventional Take-Off and Landing (CTOL), 
the F-35B Short Take-Off and Vertical Landing (STOVL), 

and the F-35C Carrier variant (CV). The F-35A CTOL 
replaces the Air Force F-16 and А-10 aircraft and complements 
the F-22 aircraft; the F-35B STOVL aircraft replaces the Marine Corps AV-8B aircraft and 
F/A-18A/C/D aircraft; the F-35C CV aircraft complements the Р/А-|8Е/Е aircraft for the Navy, 
and will also be flown by the Marine Corps. The F-35 program is a joint, multi-national 
program among the United States (U.S.) Navy and Marine Corps, the U.S. Air Force, and eight 
cooperative international partners, as well as three Foreign Military Sales (FMS) countries. The 
Marine Corps and the Air Force declared Initial Operational Capability in July 2015 and 
August 2016, respectively. The final assembly of F-35 aircraft for the U.S. is at Air Force 
Plant 4, Fort Worth, Texas. 


mamas 


Mission: Provides all-weather, precision, stealthy, air-to-air, and ground strike capability, 
including direct attack оп the most lethal surface-to-air missiles and air defenses. 


FY 2018 Program: Continues development of the air system, F135 single engine propulsion 
system, and conducts systems engineering, development and operational testing, and supports 
Follow-on Modernization. Procures a total of 70 aircraft 46 CTOL for the Air Force, 
20 STOVL for the Marine Corps, and 4 CV for the Navy in FY 2018. 


Prime Contractors: Lockheed Martin Corporation; Fort Worth, TX 
Pratt & Whitney; Hartford, CT 


F-35 Joint Strike Fighter 


FY 2016* FY 2017** = aes — 
Base Budget OCO Budget Total Request 
$M Qty st Qty st Qty s Qty $M Qty 
RDT&E j 
USN 1,055.7 Е 1,197.8 š 550.7 ` : - 550.7 
USAF 621.9 Е 603.5 я 621.5 - - - 627.5 
Subtotal 1,683.6 - | L801.3 - | 1,178.22 : 2 : 1,178.2 
Procurement 
USN 3,685.5 21 3,306.8 20 3,123.1 24 Е - 4n 24 
USAF 5,190.2 41 55111 48 5,393.3 m - - 05390933 46 
Subtotal 9,415.8 68 | 8,884.5 ТЕ 9169. ПИ : - 916% и 
$раге$ 401.1 - 638.1 - 542.8 542.8 - 
Total 11,5604 68 | ЕТЕК 68 | 10,837.9 10 -  10,831.? 10 


* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-7 


428 / 570 


429 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


V-22 Osprey 


The V-22 Osprey is a tilt-rotor, vertical 
takeoff and landing aircraft designed to 
meet the amphibious/vertical assault needs 

of the Marine Corps, the strike rescue and 
Carrier Onboard Delivery (COD) 

needs of the Navy, and the long range special 
operations forces (SOF) missions for U.S. 
Special Operations Command (SOCOM). 
The aircraft is designed to fly 2,100 miles 
with one in-flight refueling, giving the Services 
the advantage of a vertical and/or short 
takeoff and landing aircraft that can rapidly 
self-deploy to any location in the world. 


Mission: Conducts airborne assault, vertical lift, combat search and rescue, and special operations 
missions. The new CMV-22 variant will replace the Navy’s C-2A Greyhound for the COD mission. 


FY 2018 Program: Funds the first year of a follow-on 7-year multiyear procurement contract 
(FY 2018 to 2024), procuring 6 CMV-22 aircraft for the Navy. 


Prime Contractors: Bell Helicopter Textron, Incorporated; Fort Worth, TX 
The Boeing Company; Philadelphia, PA 


V-22 Osprey 
FY 2016* FY 2017** Ее 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 
USN 143 - 1894 - 171.4 - - - ИЯ - 
USAF 26.8 - 28.7 - 22.5 - - - 22.5 - 
Subtotal 101.1 - 218.1 - 193.9 - - - 193.9 - 
Procurement 
USN 1,440.7 19 1,540.0 19 106.1 6 - - 106.1 6 
USAF 125.8 | 643 - 612 - - - 612 - 
Subtotal 1,567 20 1,043 19 161.9 6 - - 1619 6 
USN Subtotal 1,515.0 19 1,7294 19 878.1 6 - - 878.1 6 
USAF Subtotal 152.6 | 93.0 - 83.7 - - - 83.7 
Total 1,667.6 20 1,822.4 19 961.8 6 - - 961.8 6 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


AIRCRAFT & RELATED SYSTEMS 


1-8 


429 / 570 


430 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


AH-64E Apache 


The AH-64E Apache program is a parallel new build and remanufacture effort, 
which integrates a mast-mounted fire control radar 
into an upgraded and enhanced АН-64 airframe. 
The remanufacture effort results in a 
zero-time Longbow Apache, 
which restarts its service 
life and upgrades the aircraft 

with updated technologies and 
performance enhancements to 

keep the Apache viable throughout 

its lifecycle. The AH-64E program also 
installs the Target Acquisition 
Designation Sight and Pilot Night Vision Sensors, plus other safety and reliability enhancements. 


US Army Photo 


Mission: Conducts armed reconnaissance, close combat, mobile strike, and vertical maneuver 
missions in day, night, obscured battlefield, and adverse weather conditions. 


FY 2018 Program: Funds the remanufacture of 48 AH-64D aircraft to the AH-64E 
configuration and 13 New Build AH-64Es in the second year of a 5-year multiyear procurement 
(MYP) contract (FY 2017 — FY 2021) and continued development of upgrades to enhance 
operational capabilities. Procures two AH-64E aircraft in the Overseas Contingency Operations 
request. 


Prime Contractors: Apache: The Boeing Company; Mesa, AZ 
Integration: Northrop Grumman Corporation; Baltimore, MD 
Lockheed Martin Corporation; Oswego, NY 


AH-64E Apache 


FY 2016* FY 2017** Bu. 
Base Budget OCO Budget Total Request 
$M Qty $M Qty | $M Qty $M Qty $M Qty 
RDT&E 63.0 - 664 - 60.0 - - - 60.0 
Procurement 
AH-64E New Build - - 107.8 20 4460 13 - - 446.0 13 
AH-64E Reman 1,353.0 64 1,066.2 52 896.9 48 39.0 2 935.9 50 
Total 1,416.0 64 1,840.4 n 1,402.9 6l 39.0 2 1,441.9 63 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO) 


AIRCRAFT & RELATED SYSTEMS 


1-9 


430 / 570 


431 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


CH-47 Chinook 


The CH-47F Improved Cargo Helicopter program 
procures new and remanufactured 
Service Life Extension Program (SLEP) 
CH-47F helicopters. 
The aircraft includes an 
upgraded digital cockpit 
and modifications to the airframe 

to reduce vibration. The upgraded 
cockpit includes a digital data bus that 
permits installation of enhanced 
communications and navigation equipment 
for improved situational awareness, mission performance, 

and survivability. The new aircraft uses more powerful T55-GA-714A engines that improve fuel 
efficiency and enhance lift performance. These aircraft are fielded to heavy helicopter 
companies (CH-47F) and Special Operations Aviation (MH-47G). The CH-47F is expected to 
remain the Army's heavy lift helicopter until the late 2030s. Recapitalization of the MH-47G 
airframes is required to extend the useful life of legacy aircraft. The CH-47F Block Il 
development effort entered Engineering and Manufacturing Development in FY 2017. 
Improvements include increased lift, improved engine control, upgraded drive train components 
and advanced flight controls. New Build CH-47Fs will continue at a low rate until production of 
the CH-47F Block Il in FY 2021. 


Mission: Transports ground forces, supplies, ammunition, and other battle-critical cargo in 
support of worldwide combat and contingency operations. 


FY 2018 Program: Funds the procurement of four ReNew/SLEP MH-47G and two New 
Build CH-47F helicopters. 


US Army Photo 


Prime Contractor: The Boeing Company; Philadelphia, PA 


CH-47 Chinook 


FY 2018 
Base Budget OCO Budget Total Request 
Qty $M Qty $M Qty 


FY 2016* FY 2017** 


RDT&E 194.6 - - - 194.6 

Procurement 2204 6 - - 220.4 6 
Total 415.0 6 

ит Numbers may not add due to rounding 


AIRCRAFT & RELATED SYSTEMS 


1-10 


431 / 570 


432 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


UH-60 Black Hawk 


The UH-60 Black Hawk is a twin engine, 
single-rotor, four bladed utility - 
helicopter that is designed to carry 

a crew of 4 and a combat equipped 
squad of || or an external load up to 
9,000 Ibs. The UH-60 comes in many 
variants and with many different 
modifications. Variants may have different 
capabilities and equipment in order to 
fulfill different roles. The Army variants can 
be fitted with stub wings to carry additional fuel tanks or weapons. 

The UH-60M Black Hawk is a digital networked platform with greater range and lift to support 
operational Commanders through air assault, general support command and control, and 
aeromedical evacuation. An HH-60M is a UH-60M Black Hawk integrated with the Medical 
Evacuation (MEDEVAC) Mission Equipment Package (MEP) kit, which provides day/night and 
adverse weather emergency evacuation of casualties. 


Mission: Provides a highly maneuverable, air transportable, troop carrying helicopter for all 
intensities of conflict, without regard to geographical location or environmental conditions. It 
moves troops, equipment, and supplies into combat and performs aeromedical evacuation and 
multiple functions in support of the Army's air mobility doctrine for employment of ground 
forces. 


FY 2018 Program: Funds the procurement of 48 UH-60M aircraft in the second year of a 
follow-on 5-year multiyear procurement (MYP) contract (FY 2017 — FY 2021). Also funds the 
continued development of upgrades to the UH-60L Digital, now designated as the UH-60V. 


Prime Contractor: Sikorsky Aircraft; Stratford, CT 


UH-60 Black Hawk 


FY 2016* FY 2017** ati | 
Base Budget OCO Budget Total Request 
oO M фу я QQ Ж у M фу $M бу 
RDT&E 64.0 - 46.8 - 34.4 - - - 34.4 
Procurement 1,701.8 107 1,305.5 53 1,024.6 48 - - 1024.6 48 
Total 1,765.8 107 1,352.3 53 1,059.0 48 - - 1,059.0 48 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO) 


AIRCRAFT & RELATED SYSTEMS 


432 / 570 


433 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


E-2D Advanced Hawkeye 


The E-2D Advanced Hawkeye 

is an airborne early warning, all 
weather, twin-engine, carrier-based 
aircraft designed to extend task force 
defense perimeters. The Advanced 
Hawkeye provides improved 
battlespace target detection and 
situational awareness, especially in the 
littorals; supports the Theater Air and Missile Defense operations; and improves operational 
availability for the radar system. Relative to the E-2C aircraft, the E-2D aircraft provides 
increased electrical power, a strengthened fuselage, and upgraded radar system, 
communications suite, and mission computer. 


Mission: Provides theater air and missile sensing and early warning; battlefield management 
command and control; acquisition tracking and targeting of surface warfare contacts; 
surveillance of littoral area objectives and targets; and tracking of strike warfare assets. 


FY 2018 Program: Funds five E-2D aircraft in the fifth year of a multiyear procurement 
contract, associated support, continued development of systems, and advance procurement for 
additional aircraft in FY 2019. 


Prime Contractors: Airframe: Northrop Grumman Corporation; Bethpage, NY 
(Engineering) and St. Augustine, FL (Manufacturing) 
Engine: Rolls-Royce Corporation; Indianapolis, IN 
Radar: Lockheed Martin Corporation; Syracuse, NY 


E-2D Advanced Hawkeye | 


FY 2016* FY 2017** EE MEN 
Base Budget 00 Budget Тока! Request 


W W и (0) промо $M 0 


RDT&E 1111 - 363.8 - m5 - -M3 - 
Procurement 1,021.6 5 1055 6 095 5 - 5 8,0085. 3 
Spares 113 - 204 - 13 - - - M3 - 
Total 1,244.0 5 13994 6 1164 5 - + 4 5 
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


AIRCRAFT & RELATED SYSTEMS 


433 / 570 


434 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


H-I Program: AH-IZ Viper / UH-1Y Venom 


The H-I program replaces the АН-ІУУ 

Super Cobra and the ОН-ІМ Huey helicopters 
with the AH-1Z Viper and UH-1Y Venom, the next 
generation of USMC Attack and Utility aircraft. 
Speed, range, and payload have been increased 
significantly, while supportability demands, training 
timelines, and total ownership cost have decreased. 
The advanced cockpit is common to both aircraft, reduces ج‎ 
operator workload, improves situational awareness, and provides 
growth potential for future weapons and joint digital interoperability 
enhancements. The cockpit systems assimilate onboard planning, communications, digital fire 
control, all weather navigation, day/night targeting, and weapons systems in mirror-imaged crew 
stations. The procurement strategy converts 37 AH-IW helicopters into АН-175, builds 
152 new AH-IZs, remanufactures 10 Н-ІМ helicopters into UH-IYs, and builds 150 new 
UH-IYs. Both aircraft are in full rate production. The UH-IY helicopter completed the 
program of record procurement of 160 UH-IY aircraft т FY 2016. 


Mission: AH-IZ: Provides close air support, air interdiction, armed reconnaissance, strike 
coordination and reconnaissance, forward air control (airborne), and aerial escort during 
day/night operations in support of naval expeditionary operations or joint and combined 
operations. ОН-1Ү: Provides combat assault transport, close air support, armed 
reconnaissance, strike coordination and reconnaissance, forward air control (airborne), air 
delivery, airborne command and control, aerial escort and air evacuation during day/night and 
reduced weather conditions. 


FY 2018 Program: Funds the procurement of 22 new build AH-IZ aircraft. Funds 
developmental efforts to support follow-on improvements to sensors and weapons integration, 
avionics, and air vehicle components (һас will address deficiencies, systems safety, 
obsolescence, reliability, and cost growth issues for both (һе АН-12 and ОН-ІҮ helicopters. 


Prime Contractor: Bell Helicopter Textron, Incorporated; Fort Worth, TX 


H-I Program (АН-17 Viper / ОН-ІҮ Venom) 


FY 2016* FY 2017** == AES — 
Base Budget OCO Budget Total Request 
ы у ü o әл 
RDT&E 26.8 - 21.4 - 613 - - - 61.3 - 
Procurement 840.1 29 817.0 4 5 2) - - 1005 1 
Total 866.9 29 844.4 24 1818 1) - - BIS 1 
* FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-13 


434 / 570 


435 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


The Р-ВА Poseidon is an multi-mission 
platform designed to replace the P-3C 
Orion propeller driven aircraft. This 
derivative of the Boeing 737 aircraft is an 
all weather twin engine, maritime patrol 
aircraft designed to sustain and improve 
armed maritime and littoral capabilities 
in traditional, joint, and combined roles to counter changing and emerging threats. All 
sensors onboard contribute to a single fused tactical situation display which is then shared 
over both military standard and internet protocol data links, allowing for seamless delivery of 
information between U.S. and allied forces. The P-8A will carry a new radar array which is a 
modernized version of the Raytheon APS- 149 Littoral Surveillance Radar System. 


Image courtesy 
f US Navy 


x 
` 


Mission: Provides Maritime Patrol Anti-Submarine Warfare (ASW), Anti-Surface Warfare 
(ASuW), and armed Intelligence, Surveillance and Reconnaissance (ISR) capabilities in 
maritime and littoral areas above, on, and below the surface of the ocean. 


FY 2018 Program: Procures seven P-8A aircraft, support equipment, spares, and advance 
procurement for FY 2019 aircraft. Continues research and development on the P-8A 
capabilities to meet the ASW, ASuW, and ISR objectives that will be delivered incrementally 
while full rate production continues for the baseline aircraft. 


Prime Contractors: Airframe: Boeing; Seattle, WA 
Engine: CFM International; Cincinnati, OH 


P-8A Poseidon 


FY 2016* FY 2017** е 

Base Budget OCO Budget Total Request 

$M Qty $M Qty м бо Mo Qy $M Q 

RDT&E 221.6 - 2393 - 190.7 - - - 190.7 - 
Procurement 32243 17 2,934 Il 1,385.6 1 - - 1,385.6 1 
$pares 69 - 44.1 - 331 - - - 33.1 - 
Total 3,458.8 17 3,267.4 17 — 1,6094 1 - - 1,6094 7.0 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


435 / 570 


436 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


CH-53K Heavy Lift Replacement Helicopter 


The CH-53K King Stallion is a 
marinized heavy-lift helicopter 
that replaces the U. S. Marine 
Corps CH-53E, which was 
introduced in 1980. 

The CH-53K will provide 
improved lift and range 
capabilities, performance, 
commonality, cargo-handling, 
reliability, maintainability, interoperability, ship integration, survivability, and force protection. 
The CH-53K is designed to support Marine Air-Ground Task Force (MAGTF) heavy-lift 
requirements in the 215% century joint environment, and is the only heavy-lift platform that can 
lift the MAGTF ashore. It will provide an unparalleled high-altitude lift capability with nearly 
three times the external lift capacity of the CH-53E. А total of 194 aircraft are planned for 
procurement. The program achieved a Milestone C decision and will begin Low Rate Initial 
Production LRIP) in FY 2017. 


Mission: Conducts expeditionary heavy-lift assault transport of armored vehicles, equipment 
and personnel to support distributed operations deep inland from a sea-based center of 
operations. 


FY 2018 Program: Funds the procurement of the 4 Low-Rate Initial Production (LRIP) 
aircraft. Development efforts continue flight tests of System Demonstration Test Article 


(SDTA) aircraft. 


Prime Contractor: Sikorsky Aircraft Corporation; Stratford, CT 


CH-53K Heavy Lift Replacement Helicopter 


FY 2016* FY 2017** абы 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 563.2 - 404.8 - 340.8 - - - 340.8 - 
Procurement 413 - 431.0 2 114.7 4 - - 114.7 4 
Total 604.5 - 841.8 2 1,055.5 4 - - 1,055.5 4 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-15 


436 / 570 


437 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


VH-92A Presidential Helicopter š 


The УН-92А replaces the legacy 
Presidential Helicopter fleet — the 
VH-3D, which was fielded in 1974, 
and the VH-60N, which was fielded 

in 1989. The VH-92A will be based 
on Sikorsky's commercial S-92A 
helicopter. The УН-92А% acquisition 
strategy involves the integration of 
mature government-defined mission 
systems and an executive interior 
into an existing air vehicle. 

The program entered the Engineering 
and Manufacturing Development 
(EMD) phase in FY 2014. A total of 
21 operational aircraft will be 
procured. Two Engineering Development Model (EDM) and four System Demonstration Test 
Article (SDTA) aircraft have been delivered in EMD. 


^^ E 


ips it 


Mission: Provide safe, reliable and timely transportation for the President, Vice President, 
Foreign Heads of State, and other official parties as directed by the Director of the White 
House Military Office. Mission tasking includes administrative lift and contingency operations. 


FY 2018 Program: Funds the continuing EMD effort, including: beginning Contractor Testing 
(CT) for airworthiness certification and commencing modification of EDM and SDTA aircraft to 


VH-92 configuration. 


Prime Contractor: Sikorsky Aircraft Corporation; Stratford, CT 


VH-92A Presidential Helicopter | 


FY 2016* FY 2017** 0 
Base Budget 0C0 Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 490.8 - 3384 - 4519 - - - 4.9 - 
Procurement - - = - - - - - 
Total 490.8 - 338.4 - 45.9 - - - 51.9 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


AIRCRAFT & RELATED SYSTEMS 


1-16 


437 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


F/A-18 E/F Super Hornet 


The F/A-18 E/F Super Hornet is a carrier-based 
multi-role tactical fighter and attack aircraft. 
Two versions are being produced: the 
single-seat E model and the two-seat F model. 
The Super Hornet is an attack aircraft as 

well as a fighter through selected use of 
external equipment and advanced networking 
capabilities to accomplish specific missions. 
This "force multiplier" capability gives the 
operational commander more flexibility 

in employing tactical aircraft in a rapidly 
changing battle scenario. In its fighter mode, 
the aircraft serves as escort and fleet air defense. In its attack mode, the aircraft provides force 
projection, interdiction, and close and deep air support. 


Image courtesy 
of US Navy 


Mission: Provides multi-role attack and strike fighter capability which includes the traditional 
applications, such as fighter escort and fleet air defense, combined with the attack applications, 
such as interdiction and close air support. 


FY 2018 Program: Procures fourteen E/F model aircraft, which will lessen the shortfall in 
Naval combat aircraft. 


Prime Contractors: Airframe: Boeing; St. Louis, MO 
Engine: General Electric Company; Lynn, MA 


F/A-18 E/F Super Hornet 


FY 2016* FY 2017** Ше. 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qy Ж» Qty $M — Qty 
RDT&E ; : — то 
Procurement 350.0 5 2,504.9 26 1,253.1 14 - - 1,253.1 14 
Total 350.0 5 2,504.9 26 1,253.1 14 - - 1,253.1 I4 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


AIRCRAFT & RELATED SYSTEMS 


438 / 569 438 / 570 


439 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Presidential Aircraft Recapitalization (PAR) 


The Presidential Aircraft Recapitalization 
(PAR) program will replace the current 
VC-25A (Boeing 747-200) "Air Force One" ; = КЕЕ 
aircraft with a new, modified 747-8 2% = agn 
to provide the President, staff, and guests | 
with safe and reliable air transportation 
at the same level of security and 
communications capability available in the 
White House. Due to advancing age, the 
VC-25A is experiencing increasing out of 
service times — currently well over a year 
for heavy maintenance to maintain compliance with Federal Aeronautics Administration 
airworthiness standards. Boeing will be the sole source integrator responsible for modifying, 
testing, and fielding two PAR aircraft by 2024. 


Mission: Provides safe, secure, worldwide transport to ensure the President can execute the 
constitutional roles of Commander-in-Chief, Head of State, and Chief Executive. 


FY 2018 Program: Continues preliminary design and incremental funding of two 
commercial aircraft for future modification to the PAR configuration. Begins Engineering and 
Manufacturing Development of the PAR modifications to the commercial aircraft and required 
test activities. 


Prime Contractor: The Boeing Company; Seattle, WA 


Presidential Aircraft Recapitalization (PAR) 


FY 2016* FY 2017** Bi. 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 82.4 - 3512 2 4341 - - - 4341 - 
Procurement - - - - - - - - - 
Total 824 - 3512 2 4341 - - - 4341 - | 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-18 


439 / 570 


440 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Long Range Strike 


Long Range Strike (LRS) is intended to B-2 Spirit 


counter post-2020 challenges to DoD's power 
projection capabilities. The LRS initiatives, collectively 
termed "Family of Systems" (FoS), will provide a synergistic, more 
cost-effective force multiplier power projection capability in the 
post-2020 threat environment. The LRS program includes the next 
Generation and legacy bombers. Current bombers in the Air Force 
inventory are the В-1, B-2, and B-52 aircraft. The B-21 (Long 
Range Strike Bomber) is a new, high-tech long range 
bomber that will eventually replace the Air Force's 
aging bomber fleet. The B-21 will be a key 
component of the joint portfolio of conventional 
and nuclear deep-strike capabilities. 


B1 Lancer 
Heavy Bomber 


B-52 


w * Stratofortress 


Mission: Flies into enemy territory to destroy 
strategic targets such as major military installations, factories a 
cities to debilitate an adversary's capacity to wage war. The B-| bomber-can perform a variety 
of missions, including that of conventional carrier for theater operations and can rapidly deliver 
massive quantities of precision and non-precision weapons against any adversary, worldwide, at 
any time. The B-2 aircraft delivers both conventional and nuclear munitions, capable of massive 
firepower in short time anywhere. The B-52 aircraft maintains nuclear or conventional 
missions. Mission details of the B-21 are currently classified. 


FY 2018 Program: Continues engineering and manufacturing development of the next 
generation B-2| and upgrades to modernize legacy strategic bombers. 


Prime Contractors: Northrop Grumman Aerospace Systems; Palmdale, CA 


Long Range Strike 


FY 2016* FY 2017** 0: 

Base Budget 0C0 Budget Total Request 
5М Qty $M Qty $M Qty 5М 0у $M Qty 
RDT&E 1,149.8 - 1,920.5 - 2,565.6 - - - 2,565.6 - 
Procurement 281.8 - 306.1 - 361.7 - - - 361.7 - 
Spares 24.0 - 15.1 - 18.1 - - - 18.1 - 
Total 1,455.6 - 22417 - | 2,9454 - - - 2,9454 - 

*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-19 


440 / 570 


441 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


F-22 Raptor 


The F-22 Raptor is a fifth generation air NS 
superiority aircraft fighter. The Raptor is designed to ©. 
penetrate enemy airspace and achieve first-look, 
first-kill capability against multiple targets. It са 
has unprecedented survivability and до CM 
lethality, ensuring the Joint Forces | 
have freedom from attack, freedom to maneuver, 
and freedom to attack. 


USAF Photo 


Mission: Provides the U.S. Enhanced air superiority/global 
strike capability to counter and defeat air-air and air-ground 

threats in a highly contested environment by conducting counter air, Destruction of Enemy Air 
Defenses (DEAD) and cruise missile defense missions. 


FY 2018 Program: Continues critical planned modernization for F-22 aircraft ма 
incremental capability upgrades and key reliability and maintainability improvements. Continues 
development and testing of advanced air superiority capabilities to include integration of AIM- 
1200 and AIM-9X, additional electronic protection, and improved geolocation. Completes 
fielding of Increment 3.1, enhancing Global Strike capabilities such as Small Diameter Bomb |, 
Synthetic Aperture Radar and Geolocation. 


Prime Contractors: Lockheed Martin; Marietta, GA and Fort Worth, TX 
Pratt & Whitney; Hartford, CT 


F-22 Raptor 


FY 2016* FY 2017** ae 

Base Budget OCO Budget Total Request 
jM Qty M 0) M Qty jM 0) $M Q 
RDT&E 340.2 - 419 - 5 - - - 045 . 
Procurement | 1154 - MM - 204 - - - 194 - 
Spares 29 - 5.2 - 8.5 - - - 8.5 - 
Total 518.5 - 1044 - 955 - - - 955 - 

*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-20 


441 / 570 


442 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


KC-46A Tanker 


The KC-46, an aerial refueling tanker, 

will provide aerial refueling support to the Air 
Force, Navy, and Marine Corps aircraft. The aircraft 
Provides increased refueling capacity, improved efficiency, 
and increased cargo and aeromedical evacuation capability 
over the current KC-135 Stratotanker, which is more than 50 years old. —у 
The first phase of aerial refueling tanker recapitalization will procure 179 aircraft, approximately 
one-third of the current KC-135 tanker fleet. Envisioned KC-Y and KC-Z programs will 
ultimately recapitalize the entire tanker fleet over a period of more than 30 years. The KC-46 
aircraft is assembled on the existing commercial 767 production line and militarized in the 
Everett Modification Center, both of which are located in Everett, Washington. 


ж. 


USAF Photo 


Mission: Provides the capability to refuel joint and coalition receivers via a boom or drogue 
system and will augment the airlift fleet with cargo, passenger and aeromedical evacuation 
capabilities. Aerial refueling forces perform these missions at the strategic, operational, and 
tactical level across the entire spectrum of military operations. The KC-46 aircraft will 
operate in day/night and adverse weather to enable deployment, employment, sustainment, and 
redeployment of U.S. and Coalition forces. 


FY 2018 Program: Continues the Air Force's development efforts of a militarized variant of 
the Boeing 767-2C aircraft, the building and integration of military capabilities into four 
development aircraft, the completion of developmental testing and the start of Initial 
Operational Test and Evaluation. Also includes funding for the continued development of 
technical manuals, continued Type І training, and collection of simulator and maintenance data. 
Continues a fourth year of Low Rate Initial Production (LRIP), procuring 15 aircraft in FY 2018. 


Prime Contractor: The Boeing Company; Seattle, WA 


KC-46A Tanker 


FY 2016* FY 2017** if. 
Base Budget OCO Budget Total Request 


М Q0 и Q0 МҮ Qy M 0 $M 60у 


RDT&E 512.1 - 261.7 - 93.8 - - - 93.8 
Procurement — 23346 D 28846 I5 | MM p - - 1561 В 
pares 34 - 12 - 4134 - - - 413 - 
Total 2,959.7 lJ 3,318.5 I5 3,0529 р - - 3019 В 
ЖҮ 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-21 


442 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


The F-15C/D is a twin engine, single seat, 
supersonic, all-weather, day/night, air 
superiority fighter. Тһе F-I5E is a twin 
engine, two seat, supersonic dual-role, 
day/night, all-weather, deep interdiction 
fighter with multi-role air-to-air capabilities. 


USAF Photo 


Mission: Provides the Air Force with the capability to gain and maintain air supremacy over 
the battlefield. 


FY 2018 Program: Continues the F-I5E Radar Modernization Program (RMP), which 
replaces the legacy radar using existing technology from other aviation platforms and solves 
parts obsolescence problems to provide improved reliability and performance (increased 
synthetic aperture radar range and resolution), including air-to-air and air-to-ground modes. 
Continues the F-15 C/D radar upgrade program, which replaces the mechanically-scanned 
antenna оп F-I5C/D aircraft with an active electronically scanned array (AESA). Continues 
development of the Eagle Passive/Active Warning Survivability System, which is intended to 
improve F-I5E survivability by enhancing the ability to detect, deny, or defeat air and ground 
threats. 


Prime Contractor: Boeing; St Louis, MO 


F-15 Eagle 


FY 2016* FY 2017** асаа 

Base Budget OCO Budget Total Request 

$M Qty $M Qty $M Qty $M Qty $M Qty 

RDT&E 384.5 - 613.4 - 530.1 - - - 530.1 - 
Procurement 596.9 - 105.7 - 4112 - - - 417.2 - 
Spares 21.1 - 495 - 15.8 - - - 15.8 - 
Total 1,002.5 - 768.5 - 963.1 - - - 963.1 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


AIRCRAFT & RELATED SYSTEMS 


1-22 


443 / 569 443 / 570 


444 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Combat Rescue Helicopter (CRH) 


The Combat Rescue Helicopter (CRH) Program, 
formerly referred to as HH-60 Recapitalization, 

will replace the aging HH-60G helicopter. The HH-60 
Pave Hawk is the U.S.Air Force version 
of the U.S. Army's 

UH-60 Black Hawk, 
modified for Combat Search 
and Rescue (CSAR) in all weather 
situations. The CRH program 
will leverage in-service production 

air vehicles and training systems and then integrate existing technologies and missions systems 
to acquire a new system. Onboard defensive capabilities will permit the СЕН system to 
operate in an increased threat environment. An in-flight refueling capability will provide an 
airborne ready alert capability and extend its combat mission range. The CRH program plans 
to procure a total of 112 aircraft. 


USAF Photo 


Mission: Conduct day and night marginal weather CSAR in order to recover downed aircrew 
and isolated personnel in hostile environments. The CRH will perform a wide array of 
collateral missions, including casualty evacuation (CASEVAC), medical evacuation (MEDEVAC), 
non-combat evacuation operations, civil search and rescue, international aid, disaster 
humanitarian relief, and insertion/extraction of combat forces. 


FY 2018 Program: Funds Engineering and Manufacturing Development (EMD) activities, 
including development and testing efforts on the System Demonstration Test Article (SDTA) 
aircraft, missions systems, training systems and associated product support. 


Prime Contractor: Sikorsky Aircraft Corporation; Stratford, CT 


Combat Rescue Helicopter 


FY 2016* FY 2017** RICO 
Base Budget OCO Budget Total Request 
5М Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 150.3 - 3193 - 354.5 - - - 354.5 - 
Procurement - - - - = = - - - - 
Total 150.3 - 3193 - 343 - - - 354.5 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


AIRCRAFT & RELATED SYSTEMS 


1-23 


444 / 570 


445 / 569 


5 A 


m 
e = li : 
А 
КА < > С 
STATES OY 


This page intentionally left blank. 


445 / 570 


446 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Command, Control, Communications, Computers, апа 
Intelligence (С4Г) Systems 


The Department is well underway in transforming and developing new concepts for 
the conduct of future joint military operations to achieve full spectrum dominance. 
This overarching goal to defeat any adversary or control any situation across the full 
range of military operations is achieved through a broad array of capabilities enabled by 
an interconnected network of sensors, shooters, command, control, and intelligence. 
Net-centricity transformed the way that information is managed to accelerate decision 
making, improve joint warfighting, and create intelligence advantages. U.S. forces are 
heavily-networked and require reliable secure trusted access to information and 
depend upon network-based interconnectivity for increased operational effectiveness. 
By enhancing information sharing, dispersed forces are able to communicate, maneuver, 
share a common user - defined operating picture, and successfully complete assigned 
missions more efficiently. 


The FY 2018 budget request supports the net-centricity service-based architecture 
pattern for information sharing. lt is being implemented by the C4l community via 
building joint architectures and roadmaps for integrating joint airborne networking 
capabilities with the evolving ground, maritime, and space networks. Іс encompasses 
the development of technologies like gateways, waveforms, network management, and 
information assurance. 


FY 2018 Command, Control, Communications, Computers, and 


($ in Billions) 
Automation 
$0.7 


Base 
Communica- 
tions 
$1.0 


Information 

Security & 

Assurance 
$1.0 


Theater Combat 
C3 & Services 
$5.2 


Technology 
Develop-ment 
$0.7 


Numbers may not add due to rounding С4І SYSTEMS 


2-1 


446 / 570 


447 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Warfighter Information Network - Tactical 


The Warfighter Information Network-Tactical 
(WIN-T) is the cornerstone for Army's high speed, 
high capability backbone communications network, y ^ 
linking Warfighters in the battlefield with the Global САЛЛИМ т) 
Information Grid. The network is intended to provide E e 
command, control, communications, computers, 
intelligence, surveillance, and reconnaissance. The 
system is developed as a network for reliable, secure, 
and seamless video, data, imagery, and voice services 
for the Warfighters in theater to enable decisive 
combat actions. Increment | provides 

“networking at the halt” by upgrading the Joint Network Node (JNN) satellite capability to access the 
Wideband Global Satellite. Increment 2 (Inc 2) provides networking on-the-move to the company 
level. Tactical Cyber and Network Operations (TCNO) develops the Network Operations (NetOps) 
software to meet the Army's network convergence goals. The TCNO provides the fully integrated 
NetOps capability to allow seamless integration of tactical network planning, management, monitoring, 
and defense for the Signal Staff. 


Mission: Provides the Army with a transformational modernized network. Using satellite and 
ground layers, it delivers fully mobile, flexible, dynamic networking capability enabling Joint land forces 
to engage enemy forces deeper and more effectively. The WIN-T Inc 2 introduces a mobile, ad-hoc, 
self-configuring, self-healing network using satellite on-the-move capabilities, robust network 
management, and high-bandwidth radio systems to keep mobile forces connected, communicating, and 
synchronized. 


FY 2018 Program: Funds the procurement of 61 WIN-T Inc 2 communication nodes and 846 other 
configuration items for fielding to 3 Brigade Combat Teams, | Division, and 3 Infantry Brigade Combat 
Teams. 


Prime Contractors: General Dynamics Corporation; Taunton, MA 
Lockheed Martin Corporation; Gaithersburg, MD 


Warfighter Information Network- Tactical 


FY 2016* FY 2017** ДАЕ 

Base Budget 0(0 Budget Total Request 

ии Я Qy н у M Q н фу 

RDT&E 435 - 49 - 4Л - - - 4.1 - 
Procurement 695.1 - 4312 - 420.5 - - - 420.5 - 
Spares 395 - 19.8 - 23.9 - - - 13.9 - 
Total 118.1 - 461.9 - 449.1 - - : 449.1 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


C4l Systems 


447 / 570 


448 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


jo. 


Handheld, Manpack, and Small Form Fit Radió Kees, 


The Handheld, Manpack, and Small Form Fit (HMS) 
program procures radios that are software 
reprogrammable, networkable, multi-mode systems 
capable of simultaneous voice and data communications. 
The HMS encompasses the Handheld Radios 
(one-channel Rifleman Radio (RR) and two-channel 
Leader Radio (LR), Manpack Radio (MP), and Small Form 4 
Fit (SFF) radios. Тһе RR is a handheld radio that connects | 
Soldiers at the lowest echelon of the Army network by 
providing one-channel secure voice and data communications using Soldier Radio Waveform (SRW). 
The LR is a Multiband two-channel handheld radio to be used at the Team, Squad, and Platoon level. 
The LR will simultaneously support Single Channel Ground and Airborne Radio System (SINCGARS) 
voice interoperability and Soldier Radio Waveform (SRW) data and voice communications in one radio 
with both handheld and mounted configurations. The MP radio is a certified Type | radio used for 
transmission of up to Secret information. The MP is capable of providing two simultaneous channels 
of secure voice and data communications using SINCGARS, SRW, and Demand Assigned Multiple 
Access Satellite Communication. The embedded SFF radios may be used for Unmanned Vehicles and 
other platform applications. 


Mission: Provides voice and data communications to the tactical edge/most disadvantaged Warfighter 
with an on-the-move, at-the-halt, and stationary Line of Sight/Beyond Line of Sight capability for both 
dismounted personnel and mounted platforms. The MP and the RR extend the network down to the 
Squad/Team leader. These networking tactical radio systems meet requirements for the Army, Navy, 
Marine Corps, and Special Operations Command and are interoperable with specified radios in the 
current forces. 


FY 2018 Program: Funds the required full and open competition contract strategy for the RR and 
the MP radios. Conducts testing for the MP and the RR candidate products to demonstrate 
compliance with program requirements to assess effectiveness, suitability, and survivability and to 
obtain material release for Full Rate Production. Funds support safety, spectrum supportability, and 
additional certifications necessary to prepare the products for fielding. Procures 506 RR and 3,152 MP, 
support equipment, fielding, non-recurring engineering, and platform vehicle integration. 


Prime Contractors: General Dynamics C4 Systems Incorporated; Scottsdale, AZ 
Harris Radio Corporation; Rochester, NY 
Thales Communications Incorporated; Clarksburg, MD 


Handheld, Manpack, and Small Form Fit 


FY 2016* FY2017* | ieu. — 
Base Budget OCO Budget Total Request 
и ж му M wy Я у M Q 
RDT&E 45 - 18.8 - 20.1 - - - 20.1 - 
Procurement 54.6 - 213.6 5,656 3554 - - - 4 - 
Total 591 - 292.4 5,656 315.5 - - - 355 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


C4l SYSTEMS 


448 / 570 


449 / 569 


5 A 


m 
e = li : 
А 
КА < > С 
STATES OY 


This page intentionally left blank. 


449 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Ground Systems 


The Department is modernizing its ground force capabilities to ensure the United 
States remains a dominant force capable of operating in all environments across the full 
spectrum of conflict. The Army and Marine Corps equip each soldier and Marine with 
the best equipment available to succeed in both today's and tomorrow's operations. 
Ongoing technology research and concept exploration will benefit future Army and 
Marine Corps combat portfolios. 


The Army continues to modernize and upgrade select Major Defense Acquisition 
Programs in FY 2018, including Stryker vehicles, Abrams Tanks, Bradley Fighting Vehicles, 
and Paladin 155mm Howitzers. The Marine's ground force focus in FY 2018 is on the 
Amphibious Combat Vehicle (ACV). The ACV will deliver shore and sea-based infantry 
to the battlefield in vehicles designed for future operational environments. All the 
Services will procure the Joint Light Tactical Vehicle (JLTV) as part of the Low Rate 
Initial Production (LRIP). 


FY 2018 Ground Systems - Total: $11.2 Billion 


($ in Billions) 


Weapons 
$1.2 


Combat Vehicles 
$3.4 


Heavy Tactical 
Vehicles 
$0.4 


Support Light Tactical 
Equipment Vehicles 
$4.8 $1.3 


Medium Tactical 
Vehicles $0.1 


GROUND SYSTEMS 


Numbers may not add due to rounding 


3-1 
450 / 569 450 / 570 


451 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Joint Light Tactical Vehicle 


The Joint Light Tactical Vehicle (JLTV) is a joint 
program currently in development for the Army 
and Marine Corps. The JLTV is intended to 
replace the High Mobility Multipurpose 
Wheeled Vehicle (НММУУУ), which is the 
current light tactical vehicle. The JLTV concept 
is based on a family of vehicles focused on 
scalable armor protection and vehicle agility, 
and mobility required of the light tactical vehicle t E 

fleet. The JLTV will provide defensive measures to protect ens while in transport, increase 
payload capability, and achieve commonality of parts and components to reduce the overall life 
cycle cost of the vehicle. The JLTV project seeks to optimize performance, payload, and 
protection of the crew and vehicle while ensuring a design that is transportable by CH-47, 
CH-53, and C-130 aircraft. The program achieved Milestone C in October 2015. 


Mission: Provides a light tactical vehicle capable of performing multiple mission roles, and 
providing protected, sustained, networked mobility for personnel and payloads across the full 
range of military operations. There are two variants planned: Combat Support Vehicles 
(3,500 16) and Combat Tactical Vehicles (5,100 Ib). 


FY 2018 Program: Funds the third and final year of Low Rate Initial Production (LRIP), 
procuring 2,777 trucks. Continues Full Up System Level (FUSL) test, Multi-Service 
Operational Test and Evaluation (MOT&E), Automatic Fire Extinguishing System (AFES) test, 
and Command, Control, Communications, Computers, Intelligence, Surveillance, and 
Reconnaissance (С415К) test. 


Prime Contractor: Oshkosh Corporation; Oshkosh, WI 


Joint Light Tactical Vehicle 


FY 2016* FY 2017** M 
Base Budget 0(0 Budget Total Request 
SM 0 $M Qty $M Qy M 0 $M Qty 
RDT&E USA 312 - 115 - 235 - - - 135 - 
RDT&E USMC 248 - 332 - 207 - - - 20.7 - 
Procurement USA 249.9 686 581.5 1,828 8044 2,110 - - 8044 2,110 
Procurement АР 1.7 - 404 - 594 138 l.l 2 60.5 140 
Procurement USMC 58.6 119 113.2 192 233.6 527 - - 233.6 527 
Total 366.2 805 7758 2,020 1,1416 2,775 I. 2 114271 — 2,777 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


GROUND SYSTEMS 


3-2 


451 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Armored Multi-Purpose Vehicle (AMPV) 


The Armored Multi-Purpose Vehicle (AMPV) 
will replace the MI 13 Armored Personnel 
Carrier program that was terminated in 
2007. The AMPV will have five mission 
roles: General Purpose, Medical 

Treatment, Medical Evacuation, Mortar 
Carrier and Mission Command. The 
current MI 13 Armored Personnel L 
Carrier Mission Equipment Packages (MEPs) | 
will be integrated onto a new hull 
structure based on the Bradley Fighting _ < 
Vehicle design to give the Army its required capability at an affordable cost. 


Mission: Enables the Armored Brigade Combat Team (ABCT) commander to control a 
relentless tempo that overwhelms the threat with synchronized and integrated assaults that 
transition rapidly to the next engagement. 


FY 2018 Program: Funds Engineering and Manufacturing Development (EMD) prototype 
testing (including performance and reliability testing), completion of the Interim Design Review 
(IDR) and the Functional Configuration Audit (FCA), continued development of Logistics 
Support products, procurement of Live Fire Test Assets, and procurement of 107 Low Rate 
Initial Production vehicles. 


Prime Contractor: BAE Systems; York, PA 


Armored Multi-Purpose Vehicle (ЛЛА) 


FY 2016* FY 2017** Аи 
Base Budget OCO Budget Total Request 
SM 0 $M Qty $M Qty $M Qty $M Qty 
RDT&E 213.0 - 184.2 - 1998 - - - 1993 
Procurement - - - - 193.7 4) 2539 6  MI.6 107 
Total 213.0 - 184.7 - 39315 0 253.9 6 6414 107 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


ix **FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 
GROUND SYSTEMS 


3-3 
452 / 569 452 / 570 


453 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Family of Heavy Tactical Vehicles 


The Family of Heavy Tactical Vehicles (FHTV) 
consists of the Palletized Load System 
(PLS) and the Heavy Expanded Mobility 
Tactical Truck (HEMTT). 

The PLS entered service in 1993 

and consists of a 16.5 ton, 10 wheel 
tactical truck with self load/unload capability. 

The PLS carry payload on flat rack cargo bed, trailer, or International Standards 
Organization (ISO) containers. Тһе НЕМТТ is a 10 ton, 8 wheel (8x8) truck that comes іп 
several configurations: Tanker to refuel tactical vehicles and helicopters, Tractor to tow the 
Patriot missile system and Multi-Launch Rocket System (MLRS), Wrecker to recover 
vehicles, and Cargo truck with a materiel handling crane. The HEMTT family entered 
service in 1982. 


Mission: Provides transportation of heavy cargo to supply and re-supply combat vehicles 
and weapons systems. The PLS is fielded to transportation units, ammunition units, and to 
forward support battalions with the capability to self-load and transport a 20 ft. ISO 
container. The upgraded HEMTT A4 is an important truck to transport logistics behind 
quick-moving forces such as the M-I Abrams and Stryker. The HEMTT family carries all 
types of cargo, especially ammunition and fuel, and is used for line haul, local haul, unit 
resupply, and other missions throughout the tactical environment to support modern and 
highly mobile combat units. 


FY 2018 Program: Funds the procurement of 621 FHTVs, as well as trailers to 
modernize the heavy tactical vehicle fleet for the Active, National Guard, and Reserve units 


and to fill urgent theater requirements. 


Prime Contractor: Oshkosh Corporation; Oshkosh, WI 


Family of Heavy Tactical Vehicles 


FY 2016* FY 2017** Боа 
Base Budget 00 Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E - - 1.4 - 105 - 10.5 - 
Procurement 30.8 35 45.] 481 81.6 359 25,9 262 107.5 621 
Total 30.8 345 57.1 481 92.1 359 25.9 262 118.0 621 
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


GROUND SYSTEMS 


453 / 570 


454 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


М-І Abrams Tank Modification/Upgrades 


The MIA2 Abrams is the Army's main 4 
battle tank, which first Ep Army noto 
entered service in 1980. 

It was produced from 1978 

until 1994. Since then, the 

Army has modernized it with a 
series of upgrades to improve its 
capabilities, collectively known as 
the System Enhancement Package (SEP) and the Tank Urban Survival Kit (TUSK). Current 
modifications to the MI Abrams include Ammunition Data Link, Low Profile Commander’s 
Remote Operated Weapon Station and Power Train Improvement & Integration Optimization, 
which provide more reliability, durability and fuel efficiency. Survivability enhancements include 
Active Protection System upgrades. 


Mission: Provides mobile and protected firepower for battlefield superiority against heavy 
armor forces. 


FY 2018 Program: Funds ECP |А testing and continues Engineering Change Proposal (ECP) 
IB (lethality improvements) development. Funds the upgrade of 56 MIAI vehicles variants to 
the MIA2 SEP v3 variant. Continues support of the ECP IA installation of 
MIA2SEP v3 production т FY 2018 and as well as numerous approved modifications to fielded 
MIA2 Abrams tanks, including the Ammunition Data Link (ADL) to enable firing of the Army's 
new smart 120mm ammunition, Low Profile Commander's Remote Operating Weapon Station 
(CROWS) and Active Protection System. 


Prime Contractor: General Dynamics Corporation; Sterling Heights, MI 


М-І Abrams Tank Modification/Upgrades 


FY 2016* FY 2017** еее тал алт аа 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M 0 
RDT&E 138 - 88.5 - 108.6 - - 108.6 
Procurement 430.9 - 810.2 21 5238 20 581.5 36 1,105.3 56 
Total 504.7 - 898.1 27 6324 20 581.5 36 1,213.9 56 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


GROUND SYSTEMS 


3-5 


454 / 570 


455 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Paladin Integrated Management (PIM) 


The M109 Family of Vehicles (FOV) 
consists of the MI09A6 Paladin 155mm # 
Howitzer, the most advanced 
self-propelled cannon system in the 
Army, and the Field M992A2 Artillery 
Ammunition Support Vehicle (FAASV), 
an armored resupply vehicle. The 
Paladin Integrated Management (PIM) 
program addresses obsolescence, space, ™ 
weight, and power concerns and 
Ensures sustainment of the М109 FOV 
through 2050. Тһе PIM replaces the current MIO9A6 Paladin and M992A2 FAASV vehicles 
with a more robust platform, incorporating the M2 Bradley common drive train and suspension 
components. The PIM fills the capability gap created by cancellation of the Non-Line of Sight 
Cannon (NLOS-C) (a component of the Future Combat System program) in 2009. Begins Full 
Rate Production (FRP) in FY 2018. 


Mission: Provides the primary indirect fire support for Armored Brigade Combat Teams, 
armored and mechanized infantry divisions as well as an armored resupply vehicle. 


FY 2018 Program: Funds the close out of the Engineering Manufacturing Development 
(EMD) work, training devices for cannon system development, and procures 71 PIM systems. 


Prime Contractor: BAE Systems; York, PA 


Paladin Integrated Management (PIM) 


FY 2016* тда ұ 
Base Budget 0(0 Budget Total Request 
M Qty M Qty M Q M 05 $M Qty 
RDT&E 136.4 - 415 - 6.1 - - - 6. | - 
Procurement 113, 30 5945 48 646.4 59 125.7 D ml! 1! 
Total 410.3 30 636.0 48 6525 59 1251] n ne ТІ 
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


GROUND SYSTEMS 


3-6 


455 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Family of Medium Tactical Vehicles 


The Family of Medium Tactical Vehicles (FMTV) is a 
family of diesel powered trucks in the 2'/-ton 

and 5-ton payload class. The vehicle first went into 
service in 1996. Іс capitalizes оп the current state 
of automotive technology including a diesel 

engine, automatic transmission, and central tire 
inflation system (CTIS). The family of vehicles 
significantly reduces logistics burden and 

operating costs, taking advantage of over 

80 percent parts commonality. Numerous models 
perform a wide variety of missions including cargo 
transport (cargo model), vehicle recovery operations (wrecker), 

construction (dump), line haul (tractor), airdrop missions, and civil disaster relief. The 
FMTV also serves as the platform for the High Mobility Artillery Rocket System (HIMARS) 
and support vehicle for the Patriot missile. It is strategically deployable in C-5, C-17, and 
C-130 aircraft. Incorporating Engineering Change Proposal in FY 2018 to increase suspension 
capacity, improved ride quality and mobility when inserting underbody protection. 


Mission: Provides unit mobility and resupply of equipment and personnel for rapidly 
deployable worldwide operations on primary and secondary roads, trails, cross-country terrain, 
and in all climatic conditions. 

FY 2018 Program: Funds the procurement of 37 Medium Tactical Vehicles to support the 
Army modular transformation effort to modernize the tactical wheeled vehicle fleet for 


medium size trucks. 


Prime Contractor: Oshkosh Corporation; Oshkosh, WI 


Family of Medium Tactical Vehicles (ҒМТУ) 


FY 2016* FY 2017** F 
Base Budget 0(0 Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E - - 6.0 - - - 6.0 - 
Procurement 334.0 1,155 352.8 1,252 18.7 37 - - 18.1 31 
Total 340 1,155 352.8 1252 84.1 37 - - 84.1 М 
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


GROUND SYSTEMS 


3-7 
456 / 569 456 / 570 


457 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Stryker Family of Armored Vehicles 


Stryker is а 19-соп wheeled armored vehicle that provides 
the Army with a family of 17 different vehicles 

(10 flat bottom and 7 Double V-Hull). The Stryker 
can be deployed by C-130 (flat bottom only), 
С-17, and C-5 aircraft and be combat-capable 
upon arrival in any contingency area. There are 
two basic versions, which include the Infantry 
Carrier Vehicle (ICV) and the Mobile Gun System 
(MGS) with eight different configurations, which 
include the Reconnaissance Vehicle (RV); Anti-Tank Guided Missile (ATGM); Nuclear, Biological, 
Chemical, and Radiological Vehicle (NBCRV); Medical Evacuation Vehicle (MEV); Commander's 
Vehicle (CV); Fire Support Vehicle (FSV); Mortar Carrier (MC); and Engineer Squad Vehicle (ESV). 


Mission: The Stryker vehicle is designed to enable the Brigade Combat Team to maneuver 
more easily in close and urban terrain while providing protection in open terrain. It fills the 
Army's current transformation goal to equip a strategically deployable brigade using a C-17 or 
C-5 and an operationally deployable brigade using a C-130 that is capable of rapid movement 
anywhere on the globe in a combat ready configuration. The Stryker enables the Army to 
respond immediately to urgent operational requirements. 


FY 2018 Program: Funds ECP | testing, ECP 2 Lethality Upgrade and continues support of 
the application of multiple fleet-wide modifications. Modifications address the following areas: 
Training Devices: Command, Control, Communications, Computers, Intelligence (C4l) 
obsolescence; reliability, capability and performance degradation; safety; and operational-related 
issues. Provides for the fielding of a 30mm weapon system. 


Prime Contractor: General Dynamics Corporation; Sterling Heights, MI 


FY 2016* FY 2017% Ше 
Base Budget OCO Budget Total Request 
Mi 0) jM 0) м Qty M 0) М Qty 
RDT&E 215.1 - 1365 - 80.6 - - - 80.6 - 
Procurement 975.9 136 | 5999 - 91.6 - - - 91. - 
Total 1,191.0 136 | 1354 - | 1782 - - - ll) - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 
GROUND SYSTEMS 


3-8 


457 / 570 


458 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Amphibious Combat Vehicle (ACV) РА 


The Amphibious Combat Vehicle (АСУ) is a Major Defense 
Acquisition Program. The ACV will replace the aging Amphibious 
Assault Vehicle. The Marine Corps has refined its ACV strategy 
based on several factors, including knowledge gained through 
multi-year analysis and ongoing development of its Ground 
Combat Tactical Vehicle Strategy. The ACV program achieved 
Milestone B in November 2015. 


Mission: The ACV will provide an armored personnel carrier 
balanced in performance, protection, and payload for employment 
with the Ground Combat Element across the range of military 
operations, including a swim capability. The program has been structured to 
provide a phased, incremental capability. 


FY 2018 Program: Funds the purchase of 4 Full-Up System Level (FUSL) Test vehicles and 
continued Test and Evaluation efforts. Procures the Low Rate Initial Production (LRIP) 
of 26 vehicles, plus procurement of related items such as production support, systems 
engineering/program management, Engineering Change Orders (ECOs), Government Furnished 
Equipment (GFE), and integrated logistics support, and Initial Spares, which support the ACV 
Increment |.| program. Milestone C is scheduled in FY 2018. 


Prime Contractors: BAE Systems; York, PA 
Science Applications International Corporation (SAIC); McClean, VA 


Amphibious Combat Vehicle (ACV) 


FY 2016* FY 2017** iu 
Base Budget OCO Budget Total Request 
$M Qty $M Оу $M Qty $M Qty $M Qty 
RDT&E 197.0 - 158.7 - 1190 - - - 119.0 - 
Procurement - - - - 161.5 26 - - 103 26 
Total 197.0 - 158.7 - 340.5 26 - - 340.5 26 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


GROUND SYSTEMS 


3-9 


458 / 570 


459 / 569 


5 A 


m 
e = li : 
А 
КА < > С 
STATES OY 


This page intentionally left blank. 


459 / 570 


460 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Missile Defense Programs 


Missile Defense is a general term for air and missile defense. This category includes 
cruise missile, air and ballistic missile defense systems program development. The 
Missile Defense Agency, Army, and the Navy are the program developers. Missile 
Defense includes all components designed to defeat hostile ballistic missiles of various 
ranges. A missile defense system includes interceptor missiles, as well as the associated 
sensors and command, control, battle management, and communications. Other 
significant investments include construction; targets and countermeasures; and the 
research, development, testing, and evaluation activities. Encompassed in this category 
are all programs that are either critical to the functionality of missile defense or 
support missile defense as a primary mission. The Aegis Ballistic Missile Defense 
System (BMDS) is the naval element of the Ballistic Missile Defense (BMD) and 
provides an enduring, operationally effective and supportable BMD capability on Aegis 
cruisers, destroyers, and Ashore. 


The FY 2018 budget request continues to invest and build inventories of air and missile 
defense capabilities, such as the Patriot Advanced Capability-3 (PAC-3) missiles, PAC-3 
Missile Segment Enhancements (MSE) interceptors, Standard  Missile-3 (5М-3) 
interceptors, Terminal High Altitude Area Defense (THAAD) interceptors, and the 
Army Navy/Transportable Radar Surveillance-2 (AN/TPY-2) radar. Further, the 
Department continues to seek expanded international efforts for missile defense with 
allies апа partners to provide pragmatic and cost-effective missile defense 
capabilities. 


FY 2018 Missile Defense Programs - Total: $9.2 Billion 


($ in Billions) 


Tactical 
Missile 
go Ballistic 
Missile 
Defense 
System 
$6.5 
Tactical 
Ballistic 
Missile 
Defense 
$1.4 


Note: $9.2 billion does not include the Missile Defense Agency's (MDA) Science and Technology ($292 million), 
Military Construction ($3 million), or the Operation and Maintenance ($504 million) funding. The total MDA funding 
is $7.9 billion for the FY 2018 request. 


Numbers may not add due to rounding MISSILE DEFENSE PROGRAMS 


4-1 


460 / 570 


461 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Aegis Ballistic Missile Defense eese 


The Aegis Ballistic Missile Defense (BMD) is the naval 
element of the Ballistic Missile Defense System (BMDS) and 
provides an enduring, operationally effective and supportable 
BMD capability on Aegis cruisers, destroyers, and Ashore. 
The Aegis BMD builds upon the existing Navy Aegis Weapons 
System (AWS) and Standard Missile-3 (SM-3) design. 
Upgrades are being made to the weapon system and SM to 
expand capability through a series of incremental, 
evolutionary improvements to counter more sophisticated 
and longer range threats. 


Mission: Provides a forward-deployable, mobile and Ashore 
capability to detect and track ballistic missiles of all ranges in 
all phases of flight with the ability to destroy short- through intermediate-range ballistic missiles 
in the midcourse and terminal phases. The Aegis BMD delivers an enduring, operationally 
effective and supportable capability on Aegis cruisers, destroyers, and Ashore to defend the U.S., 
deployed forces, and our allies. 


FY 2018 Program: Supports procurement of 34 SM-3 Block IB missiles. Procures six SM-3 
Block ПА missiles. Integrates SM-3 Block ПА into the BMD Weapon Systems. Continues 
development of the Aegis BMD 5.| Weapon Systems and Aegis BMD 6. 


Prime Contractors: Aegis Weapon System: Lockheed Martin Corporation; Moorestown, NJ 
SM-3 Interceptor: Raytheon Company; Tucson, AZ and Huntsville, AL 


AEGIS Ballistic Missile Defense 


FY 2018 
Base Budget 0(0 Budget Total Request 
Mi Qty $M Qty $M y M Qy и Qty 


FY 2016* FY 2017** 


RDT&E 882.7 7 1,054.1 - 986.5 6 - - 986.5 6 

Procurement 712.0 46 5139 35 624.1 34 - - 62.1 М 
Total 1,594.7 63 1,5680 % 1,6106 40 - - 16106 40 

Note: The FY 2016 RDT&E includes 17 SM-3 Block ПА missiles. The FY 2018 RDT&E includes Numbers may not add due to rounding 


6 SM-3 ПА missile. The FY 2016-2018 Procurement is comprised of SM-3 Block IB missiles. 
* FY 2016 includes actuals for Base and OCO 
**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


MISSILE DEFENSE PROGRAMS 


4-2 


461 / 570 


462 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


THAAD Ballistic Missile Defense 


The Terminal High Altitude Area Defense 
(THAAD) is a key element of the Ballistic Missile 
Defense System. The THAAD Battery will 
provide transportable interceptors, 

using “Hit-To-Kill” technology to destroy 
ballistic missiles inside and outside the 
atmosphere. A Battery consists of 

6 truck-mounted launchers, 48 interceptors 
(8 per launcher), І AN/TPY-2 radar, 

and | Tactical Fire Control/Communications 
component. 


Mission: Provides Combatant Commanders with a deployable, ground-based missile defense 
capability against short and medium-range ballistic missiles and asymmetric threats inside and 
outside the atmosphere. 


FY 2018 Program: Supports the procurement of 34 interceptors and associated 
components, as well as support and training equipment. Continues fielding and sustainment 
activities for seven THAAD Batteries. Continues development of THAAD software upgrades 
to address threat packages, defense planning, improved capability to engage short-range ballistic 
missiles, medium-range ballistic missile, limited intermediate-range ballistic missile threats, and 
limited integration of the THAAD battery capability into the Integrated Air and Missile Defense 
Battle Command System (IBCS) planning process. 


Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA 


Terminal High Altitude Area Defense (THAAD) 


FY 2016* FY 2017** ae 
Base Budget 0(0 Budget Total Request 
M Qty M 0) M Qy M Qty $M Q 
RDT&E 218.6 - 25 - 2664 - - - 104 
Procurement | 4484) 343. 9 36 454 34 - - 516 34 
Total 666.6 М4 181 y 118.0 34 - - 118.0 34 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


** FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


MISSILE DEFENSE PROGRAMS 


4-3 


462 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Io, Pm жар 
Ground-based Midcourse Defense Тео... DO DD. 


The Ground-based Midcourse Defense (GMD) element is a Missile 
Defense Agency program and a key component of the Ballistic Missile 
Defense System (BMDS), providing Combatant Commanders with the 
capability to engage ballistic missiles in the midcourse phase of flight. 
This phase, compared to boost or terminal, allows significant time for 
sensor viewing from multiple platforms and, thus, provides multiple 
engagement opportunities for hit-to-kill interceptors. The Ground-based 
Interceptor (GBI) is made up of a three-stage, solid fuel booster and an 
exoatmospheric kill vehicle. When launched, the multi-stage, solid fuel 
booster missile carries the kill vehicle toward the target's predicted 
location in space. Once released from the booster, the kill vehicle uses data 277” 
received in-flight from ground-based radars and its own on-board sensors 7 
to defeat the incoming missile by ramming the warhead with a closing 

speed of approximately 15,000 miles per hour. Interceptors are currently 
emplaced at Fort Greely, Alaska (AK), and Vandenberg Air Force Base 
(AFB), California (CA). The GMD fire control centers are established in 
Colorado and Alaska. 


Mission: Provides the Combatant Commanders with the capability to 
defend the United States, including Hawaii and Alaska, against long-range ballistic missiles during 
the midcourse phase of flight. 


FY 2018 Program: Continues to develop, operate, and sustain the GMD weapon system, 
which includes the planned deployment of 40 Ground Based Interceptors (GBls) at Fort Greely, 
AK, and 4 GBls at Vandenberg AFB, CA by CY 2017, for a total of 44 GBls. Funds Ground and 
Flight testing (FTG-11) in support of the Integrated Master Test Plan (IMTP) requirements. 
Continues the development of the GMD Redesigned Kill Vehicle (RKV) to include buildup of 
RKV components and extensive testing in support of component level and system level Critical 
Design Reviews (CDR) as well as RKV Alternative Seeker development. Begins replacing aging 
ground system infrastructure: Command Launch Equipment, GMD Communications Network, 
and In-Flight Interceptor Communications System (IFICS) Data Terminals and upgrades fire 
control and kill vehicle (KV) software to improve discrimination capabilities. 


Prime Contractor: Boeing Defense and Space; St. Louis, MO 


Ground-based Midcourse Defense 


FY 2016* FY 2017** 20l8 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 1,598.0 - 1,192.7 - 1,370.4 - - - 1,370.4 
Total 1,598.0 - 1,192.7 - 1,370.4 - - - 1,370.4 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


** FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO) 


MISSILE DEFENSE PROGRAMS 


463 / 569 


463 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


The Army's Patriot air and missile 
defense system, which includes the 
Advanced Capability (PAC-3) missile, 
is the only combat-proven system capable of 
defeating Tactical Ballistic Missiles (TBMs), 
Cruise Missiles, and Air-Breathing threats worldwide. 
Joint efforts between the Army and the Missile 
Defense Agency have been successful in integrating 
PAC-3 capabilities into the Ballistic Missile Defense 
System (BMDS). The PAC-3 units are the Combatant 
Commanders' most capable asset to protect forward 
deployed forces. 


Mission: Contributes to the BMDS overall situational awareness for 

short range terminal ballistic missile threats. Іс can cue other systems while protecting Joint 
assets. The Patriot force is 15 battalions, and many remain forward stationed in multiple 
theaters of operation. 


FY 2018 Program: Continues improvements in software for further reduction to probability 
of fratricide; improved communications, interoperability, supportability, electronic warfare 
capabilities; and supports transition to the Integrated Air and Missile Defense (IAMD) 
architecture. 


Prime Contractors: Raytheon Integrated Defense Systems; Tewksbury, MA 
Lockheed Martin Missiles and Fire Control; Dallas, TX 


Patriot/PAC-3 


FY 2016* FY 2017** EAE 

Base Budget OCO Budget Total Request 

$M Qty Mi Qy Я Qty M Qty SM 0 
RDT&E 08.0 - 84.0 - 167.0 - - - 167.0 
Procurement 242.0 - 425.0 58 329.1 - - - 39. 
Spares 33.0 - 42 - 190 - - - 19.0 
Total 363.0 - | 543.0 58 515.1 - - - ا5‎ 

* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


** FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


MISSILE DEFENSE PROGRAMS 


464 / 569 464 / 570 


465 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


PAC-3/MSE Missile 


The Missile Segment Enhancement (MSE) is a 
performance Improvement to the existing 
Patriot Advanced Capability (PAC-3) missile. 
The MSE upgrade enhances the PAC-3 
missile by adding а dual pulse, | | -inch 
diameter Solid Rocket Motor (SRM), improved lethality enhancer, a thermally hardened front- 
end, upgraded batteries, enlarged fixed fins, more responsive control surfaces, and upgraded 
guidance software. These improvements result in a more agile, lethal interceptor missile with 
enhanced Insensitive Munitions (IM) compliance. The PAC-3 MSE can be fired from a Patriot 
system. 


Mission: Provides the Combatant Commanders with a hit-to-kill, surface-to-air missile that 
can intercept tactical ballistic missiles, cruise missiles, and air-breathing threats that have 
chemical, biological, radiological, nuclear, and conventional high explosive warheads. The MSE 
extends the PAC-3 range, filling a critical performance gap, and affords greater protection for 
U.S. and allied forces. 


FY 2018 Program: Procures 93 MSE interceptors to increase range and altitude capability, 
meeting the ever-changing threat. 


Prime Contractor: Lockheed Martin Missiles and Fire Control; Dallas, TX 


PAC-3/MSE 


FY 2016* FY 2017 ae | 
Base Budget OCO Budget Total Request 


Mi Qty | Mi 0) | jM Qty Mi Qty М бу | 
RDT&E 1) 5 Е А 5 я : А "ET 
Procurement 5149 I2 10 06 | 459.0 93 - - 4 9 


Total 517.1 l) 101 $ 4590 93 - - 490 B 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


MISSILE DEFENSE PROGRAMS 


4-6 


465 / 570 


466 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Missiles and Munitions 


Munitions is a general term for ammunition and missiles. Ammunition are explosives 
consisting of all kinds of bombs, grenades, rockets, mines, projectiles, and other similar 
devices. There are conventional and nuclear missiles used for both tactical and 
strategic purposes. Many missiles are precision guided with the technical 
sophistication to allow guidance corrections during flight-to-target. Some programs 
include non-explosive articles that enhance the performance of other munitions. For 
example, the Joint Direct Attack Munitions (JDAM) adds guidance capability when 
attached to а gravity bomb, making it a “smart” bomb. 


In FY 2018, the Department continues to execute a balanced munitions procurement 
strategy in response to both current operations and advanced, long-term threats. The 
Department is increasing procurement of JDAM, General Purpose Bombs, Small 
Diameter Bombs, Guided Multi-Launch Rocket System, and the Hellfire missile to 
ensure sufficiency for today's warfighter, while expanding industrial capacity to meet 
increasing demands. In parallel, the Department continues to accelerate inventories of 
the next generation of standoff weapons for high value land attack targets such as the 
Joint Air-to-Surface Standoff Missile-Extended Range. Procurement of the Small 
Diameter Bomb II provides an all-weather capability against moving targets. The Navy 
will continue development of a Maritime Strike variant of Tactical Tomahawk to engage 
surface threats, which supplements the  air-launched Long Range Anti-Ship Missile 
(LRASM), with the ability to engage heavily defended maritime targets at standoff ranges 
and increased survivability. Investment also continues in shipboard air defense missiles 
such as the Standard Missile-6 to enhance the ships survivability. 


FY 2018 Missiles and Munitions - Total: $16.4 Billion 


($ in Billions) 


Conventional 
Ammunition 


$5.4 
Tactical Missiles 
$8.1 
Strategic 
Missiles 
$2.9 
Numbers may not add due to rounding MISSILES AND MUNITIONS 


5-1 


466 / 570 


467 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


USAF Image 8 | 


The Advanced Medium Range Air-to-Air Missile (AMRAAM) is an all-weather, all-environment 
radar guided missile developed to improve capabilities against very low-altitude and high- 
altitude, high-speed targets in an electronic countermeasures environment. The AMRAAM is a 
joint Navy/Air Force program led by the Air Force. 


Mission: Destroys low and high altitude, high-speed enemy targets in an electronic 
countermeasures environment. The AMRAAM is a fire-and-forget air-to-air missile, and has 
replaced the AIM-7 Sparrow as the U.S. military's standard beyond visual range intercept 
missile. The missile has undergone various service life improvements. The current 
generation, AIM-120D, has a two-way data link, Global Position System-enhanced Inertial 
Measurement Unit, an expanded no-escape envelope, improved High-Angle Off-Boresight 
capability, and increased range over previous variants. 


FY 2018 Program: Continues production as well as product improvements such as fuzing, 
guidance, and kinematics. 


Prime Contractor: Raytheon Company;Tucson, AZ 


Advanced Medium Range Air-to-Air Missile 


FY 2016* FY 2017** 08 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 
Air Force 46.2 - 62.5 - 613 - - - 61.3 - 
Navy 302 - 40.4 - 254 - - - 254 - 
Subtotal 164 - 1029 - E : Е ЕГЕ T 
Procurement 
Air Force 362.0 281 350.1 256 3043 205 - - 3043 205 
Navy 202.8 158 204.7 163 197.1 120 - - 197.1 120 
Subtotal — 5648 — 439 | 5548 419 501.4 325 - - 501.4 325 
Spares 42 - 4.0 - 63 - - - 63 - 
Total 645.4 439 661.7 419 5944 325 - - 594.4 325 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO) 


MISSILES AND MUNITIONS 


5-2 


467 / 570 


468 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Air Intercept Missile — 9X 


USAF Image 


The Air Intercept Missile-9X (AIM-9X), also known as SIDEWINDER, is a short range air-to-air 
missile that provides launch-and-leave warfighting capability. Тһе AIM-9X/Block II features a fifth 
generation staring focal plane array imaging infrared seeker with high off boresight capability. It 
is mounted on a highly maneuverable (thrust vectored) airframe, along with digital guidance and 
Infrared signal processing that results in enhanced acquisition ranges, improved IR counter- 
countermeasures capability, and robust engagement zones for first shot/first kill air-to-air 
performance. The AIM-9X is a joint Navy/Air Force program led by the Navy. 


Mission: Destroys low and high altitude, high-speed enemy targets in an electronic 
countermeasures environment. 


FY 2018 Program: Continues AIM-9X Block II full rate production and planning/research for 
future warfighting improvements. 


Prime Contractor: Raytheon Missile Systems; Tucson, AZ 


Air Intercept Missile — 9X 


FY 2016* FY 2017** а - 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty м — Qty $M Qty 
RDT&E 
Air Force 33.6 - 529 - 350 - - - 35.0 - 
Navy 591 - 563 - 42.9 - - - 42.9 
Subtotal 92.7 - 109.2 - 11.9 - - - 11.9 
Procurement 
Air Force 198.2 506 1214 281 125.4 310 - - 125.4 310 
Navy 92.5 201 10.9 152 19.1 185 - - 19.1 185 
Subtotal — 290.1 113 198.3 439 205.1 495 - - 205.1 495 
$pares 12.8 - 18.8 - 13.2 - - - 132 - 
Total 396.2 713 326.3 439 296.2 495 - - 296.2 495 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО) 


MISSILES AND MUNITIONS 


5-3 


468 / 570 


469 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Chemical Demilitarization 


The Chemical Demilitarization Program (CDP) is composed 
of two Major Defense Acquisition Programs, which are 
the Assembled Chemical Weapons Alternatives (ACWA) ) 
Program and the U.S. Army Chemical Materials Activity, ; 
both with the goal of destroying a variety of United States 
chemical agents and weapons, including the 
destruction of former chemical weapon 
production facilities. The CDP is 

designed to eliminate the existing U.S. 
chemical weapons stockpile in compliance 
with the Chemical Weapons Convention signed 

111997 and the congressionally mandated destruction deadline of December 31, 2023 - while 
ensuring the safety and security of the workers, the public, and the environment. 


US Army Photo 


Mission: There are three mission areas within the Chemical Demilitarization Program: 

1. Destroy the remaining 10 percent of the U.S. chemical weapons stockpile at the ACWA 
Program sites (Colorado and Kentucky); 

2. Implement the Chemical Stockpile Emergency Preparedness Project (CSEPP) including 
emergency response planning; 

3. Assess and destroy Recovered Chemical Warfare Material (КСУУМ) within the United 
States. 


FY 2018 Program: Continues systemization activities and destruction operations at the 
ACWA Program sites. Continues the CSEPP efforts and the emergency response planning at 
Colorado and Kentucky. Sustains the crews, equipment, and management structure required to 
ensure that the Department of Defense retains the capability to assess and destroy the RCWM 
in the United States. 


Prime Contractors: Bechtel National Incorporated; Pueblo, CO 
Bechtel Parsons, Joint Venture; Richmond, KY 


Chemical Demilitarization 


РҮ 2016®*_ | FY 2017* ПЕНЕН NN 
Base Budget 00 Budget Total Request 


$M 0 $M Qy $MM Qi $MM 09 $M Qty 


Chemical Agents and 


- i 699.8 - 825.5 - 961.7 - - - 961.1 - 
Munitions Destruction 
Total 699.8 - 825.5 - | 961.1 - - - 961.1 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


MISSILES AND MUNITIONS 


5-4 


469 / 570 


470 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Joint Air to Surface Standoff Missile 


USAF Image 


The Joint Air-to-Surface Standoff Missile (JASSM) Baseline provides a survivable, precision cruise 
missile to kill hard, medium, and soft targets. Іс is a 2,000-pound class weapon with a 1,000- 
pound multi-purpose, hardened (blast/frag/penetrator) warhead. Тһе JASSM can cruise 
autonomously in adverse weather, day or night, to defeat high value targets even when protected 
by next generation defenses. The JASSM navigates to a pre-planned target using a Global 
Positioning System-aided Inertial Navigation System and transitions to automatic target 
correlation using an imaging infrared seeker in the terminal phase of flight. Maximum unclassified 
range for the baseline JASSM variant is greater than 200 nautical miles. The JASSM is integrated 
on the Е-15Е, F-16, B-52, В-І, and B-2 aircraft. Production of JASSM Baseline concluded in 
FY201 6. 


The JASSM-Extended Range (ER) increment is highly common with the JASSM Baseline variant, 


and offers a more fuel-efficient engine and greater fuel capacity. Іс also adds 2.5 times the 
standoff range at greater than 500nm. The JASSM-ER maintains the same outer mold line and 
low-observable properties as JASSM Baseline, but replaces the turbojet engine (Teledyne) with 
higher thrust, more fuel efficient turbofan engine (Williams International). The JASSM-ER is 
currently only integrated on the В-| aircraft with integration on the F-I5E, F-16, B-52, and B-2 
aircraft by FY 2020. 


Mission: Destroys targets from a long-range standoff position deliverable by fighter and bomber 
aircraft. 


FY 2018 Program: Continues Full Rate Production for JASSM-ER. 


Prime Contractor: Lockheed Martin Corporation;Troy, AL 


Joint Air to Surface Standoff Missile 


FY 2016* FY 2017** а, 
Base Budget ОСО Budget Total Request 
$M Qty 5М Qty $M Qty $M Qty $M Qty 
RDT&E 92 - 30.0 - 29.9 - - - 29.9 

Procurement 425.6 340 431.6 360 4414 360 - - 441.4 360 
$pares 0.8 - 04 - 04 - - - 0.4 - 
Total 435.6 340 462.0 360 411.7 360 - - 411.1 360 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


MISSILES AND MUNITIONS 


5-5 


470 / 570 


471 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Joint Direct Attack Munition 


USAF Image 


The Joint Direct Attack Munition (JDAM) is a joint Air Force and Navy program led by the Air 
Force. The JDAM improves the existing inventory of general purpose gravity bombs by 
integrating а Global Positioning System (GPS)/inertial navigation guidance capability that 
improves accuracy and adverse weather capability. 


A Laser JDAM (LJDAM) variant increases operational flexibility for an expanded target set. 
The laser sensor kit added to the JDAM weapon kit provides the ability to attack targets of 
opportunity, including land-moving and maritime targets, when designated by an airborne or 
ground laser. 


Mission: Enhances DoD conventional strike system capabilities by providing the ability to 
precisely attack time-critical, high value fixed or maritime targets under adverse environmental 
conditions and from all altitudes. 


FY 2018 Program: Continues full-rate production of the system. The factory will operate at 
the maximum rate of production. 


Prime Contractor: The Boeing Company; St. Charles, MO 


Joint Direct Attack Munition 


FY 2016* FY 2017** де 
Base Budget OCO Budget Total Request 


$M 0у $M Qty $M Qty $M Qty $M Qty 
RDT&E - - 10.0 - - - З Е 


Procurement 
Air Force 534.0 22418 107.1 30,664 319.5 10,330 390.6 16990 710.1 21,320 
Navy 313 1,431 61.8 2,119 513 249 106.9 4111 164.2 1,109 


Subtotal 565.3 23,9159 16859 33,443 31768 12,822 4975 21,707 8143 34,529 
Total 565.3 23,915 7789 33,443 3168 12,822 4975 21,707 8743 34,529 


* FY 2016 includes actuals for Base апа ОСО funds Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


MISSILES AND MUNITIONS 


5-6 


471 / 570 


472 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Small Diameter Bomb (SDB) 


The Small Diameter Bomb (SDB) II is a joint 

Air Force and Navy program led by the Air Force 
to provide a conventional small sized, precision guided, 
standoff air-to-ground weapon that can be delivered 
from both fighter and bomber aircraft. 

The SDB | is a fixed target attack weapon. 

The SDB-II incorporates a seeker and data link, 
which expands the use to moving targets. 


USAF Image 


Mission: Destroys targets from a medium-range 
standoff position deliverable by both fighter and bomber aircraft, with higher load-out and less 
collateral damage compared to other weapons. SDB Il integration and testing activities 
continue on the Ғ-ІБЕ aircraft. 


FY 2018 Program: Continues Engineering and Manufacturing Development (EMD) and Low 
Rate Initial Production of SDB Il missiles for use against moving, relocatable, and fixed targets. 


The factory will operate at the maximum rate of production for SDB |. 


Prime Contractor: Boeing Company; St. Charles, MO (SDB I) 
Raytheon Missile Systems; Tucson, AZ (SDB II) 


Small Diameter Bomb 


FY 2016* FY 2017** Bee | 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E | 
Air Force 28.0 - 548 - 390 - - - 39.0 
Navy 55.8 - 91.6 - 91.6 - - - 9746 
Subtotal 83.5 - 1524 - 136.6 - - - 136.6 
Procurement 
Air Force 135.1 3,494 260.2 4507 266.0 5,039 90.9 2,273 356.9 7,312 
Spares 32 - 10.6 - 10.6 - 10.6 - 
Total 222.1 3,494 423.2 45017 413.2 5,039 90.9 2,273 5041 120 
* FY 2016 includes actuals for Base and OCO. Numbers may not add due to rounding 


MISSILES AND MUNITIONS 


5-7 


472 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Hellfire Missiles 


The Laser HELLFIRE II system family of 
air-to-ground missiles (all variants) provides attack 
helicopters and unmanned aircraft systems (UAS) 
with point-target precision strike capability to defeat 
heavy, advanced armor, individual hard point and 
non-traditional targets. HELLFIRE Il missiles use a 
semi-active laser terminal guidance and are the 
primary armament of the AH-64 Apache, Army UAS 
and Special Operations aircraft. The HELLFIRE Il 
АСМ-114К is 64 inches in length and weighs 108 Ibs. 
Weapons range is approximately 8 kilometers. 


The HELLFIRE II missile includes Electro-Optical 
Countermeasure capability, warhead 
improvements and an updated electronic fuse. 
The AGM-114R HELLFIRE II missile will be the single variant that replaces all other HELLFIRE Il 
missile configurations (K/N/M/P). 


Harvest Hawk 


Mission: Engages and defeats individual moving or stationary ground targets such as armor, 
mechanized, or vehicular targets, building, or bunkers. 


FY 2018 Program: Continues at full-rate production. The factory will operate at the 
maximum rate of production . 


Prime Contractor: Lockheed Martin; Orlando, FL 


Hellfire Missiles 


FY 2016* FY 2017** БЕЛІҢ 
Base Budget 0(0 Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
uu ТР шы 
Procurement 
Army 863 33 498 400 948 998 2781 239] 31729 3,925 
Air Force 691.1] 6,256 1191 1,536 34.9 39 2975 3,230 3324 9 
Navy - - 8.6 100 - - 8.6 110 8.6 10 
Total 184.0 6,639 685.5 5846 1297 1,397 5842 6,267 713.9 7,664 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


MISSILES AND MUNITIONS 


5-8 
473 / 569 473 /570 


474 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


The Javelin is highly effective against a 
variety of targets at extended ranges 
under day/night, battlefield obscurants, 
adverse weather, and multiple counter-measure 
conditions. The system's soft-launch feature 
permits firing from enclosures commonly found in 
complex urban terrain. The system consists of a 
reusable command launch unit (CLU) and a modular 
missile encased in a disposable launch tube 

assembly. The CLU provides stand-alone all-weather 
and day/night surveillance capability. 


USMC Photo 


Javelin provides precision effects in 
either a top-attack or direct-attack mode 
to defeat armored vehicles, fortifications and soft targets in full spectrum operations. It uses 
an imaging infrared two-dimensional staring focal plane array seeker and a tandem warhead 
with two shaped charges: a precursor warhead to defeat reactive armor, and a primary 
warhead to penetrate base armor and other structures. Іс is effective against stationary and 
moving targets. 


Mission: Provides the dismounted soldier with a man-portable, fire-and-forget system that is 
highly lethal against targets ranging from main battle tanks to fleeting targets of opportunity 
found in current threat environments. 


FY 2018 Program: Begins procurement of FGM-148F (F model) Javelin missiles with a new 
Multi-Purpose Warhead, which improves lethality against exposed personnel. Continues 
development of a lightweight CLU to reduce soldier burden and bulk. 


Prime Contractor: Raytheon Missile Systems/Lockheed Martin Javelin Joint Venture; 
Tucson, AZ and Orlando, FL 


Javelin Advanced Anti-Tank Weapon System - Medium 


FY 2016* FY 2017** Au 
Base Budget OCO Budget Total Request 
$M Qty $M Qty 5М Qty $M — 0 $M Qty 
RDT&E 40 - 20.0 - 21.1 - - - 21.1 - 
Procurement 

Army 168.2 850 193.3 983 110.1 525 8.1 4] 118.2 572 
Navy 58.9 321 19.6 524 412 22 28 lI 44.0 233 
Subtotal 227.1 1,177 272.9 1,507 151.3 141 10.9 58 1622 805 
Total 231.1 1,177 292.9 1,507 172.4 141 10.9 58 183.3 805 

* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


MISSILES AND MUNITIONS 


5-9 


474 / 570 


475 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Guided Multiple Launch Rocket System 


The Guided Multiple Launch Rocket 
System (GMLRS) provides a persistent, 
responsive, all-weather, 
rapidly-deployable and long range 
precision strike capability. 


The GMLRS is fired by the MI42 High 
Mobility Artillery Rocket System 
(HIMARS) and the M270A1 Multiple 
Launch Rocket System (MLRS) launchers. The GMLRS uses an on-board Inertial Measurement 
Unit (IMU) in combination with a Global Positioning System (GPS) guidance system to provide 
improved performance. The missile has a range of approximately 70 kilometers and can carry a 
variety of different warheads servicing point and area targets. Тһе third GMLRS increment, 
GMLRS Alternative Warhead (AW), is in production and will replace GMLRS Dual Purpose 
Improved Conventional Munition to meet requirements outlined in the 2008 Department of 
Defense Cluster Munitions Policy. The GMLRS AW will be produced on a shared production 
line and is about 9076 common with the GMLRS Unitary increment. 


US Army Photo 


Mission: Neutralizes or suppresses enemy field artillery and air defense systems and 
supplements cannon artillery fires. 


FY 2018 Program: Continues at full rate production of GMLRS (AVW/Unitary) as well as 
product improvements such as insensitive munition development. The factory will operate at 


the maximum rate of production. Facilitation will increase production capacity by FY 2020. 


Prime Contractor: Lockheed Martin Corporation; Dallas, TX 


Guided Multiple Launch Rocket System 


FY 2016* FY 201 7** HELD 
Base Budget OCO Budget Total Request 
$M Qty $M Qty м Qy M Qy $M Qty 
RDT&E 36.0 - 38.0 - 102.8 - - - 1024 
Procurement 251.1 1,866 402.6 2,954 595.2 4458 1915 150 186.7 6,000 
Total 287.1 1,866 440.6 2,954 698.0 4,458 191.5 1,542 889.5 6,000 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


MISSILES AND MUNITIONS 


5-10 


475 /570 


476 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Rolling Airframe Missile 


The Rolling Airframe Missile 
(RAM) is a high firepower, 
lightweight complementary 
self-defense system to engage 
anti-ship cruise missiles. 


The systems design is based 
upon the infra-red seeker of the 
Stinger (FIM-92) missile, and the 
warhead, rocket motor, and fuse 
from the Sidewinder (AIM-9) 
missile. The missile uses Radio 
Frequency (RF) for midcourse 
guidance, and transitions to 
Infrared (IR) guidance for 
terminal engagement. Currently there are two RIM-116 configurations: Block | (RIM-116B) 
and Block 2 (RIM-1 6C). 


Mission: Provides high firepower close-in defense of combatant and auxiliary ships by utilizing 
a dual mode, passive radio frequency/infrared missile in a compact 21 missile launcher. 


FY 2018 Program: Continues low rate of production for the Block И (RIM-I 16C) missile as 
well as operational testing. 


Prime Contractor: Raytheon Missile Systems; Tucson, AZ 


Rolling Airframe Missile | 


FY 2016* FY 2017** dis 
Base Budget 0(0 Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 23.8 - 18.1 - 412 - - - 412 - 
Procurement 154 90 954 120 | 366 60 - - 58.6 60.0 
Total 99.2 90 113.7 120 99.8 60 - - 99.8 60 
*FY 20 | 6 includes actuals for Base and OCO Е m m Numbers may not add due to rounding 


MISSILES AND MUNITIONS 


5-11 


476 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Standard Family of Missiles 


US Navy Photo 


Ке ж 


a — l= 


The Standard missile family consists of various air defense missiles including supersonic, 
medium and extended range; surface-to-air. The Standard Missile-6 is a surface Navy Anti-Air 
Warfare (AAWV) missile that provides area and ship self defense. The missile is intended to 
project power and contribute to raid annihilation by destroying manned fixed and rotary wing 
aircraft, Unmanned Aerial Vehicles (UAV), Land Attack Cruise Missiles (LACM), and Anti-Ship 
Cruise Missiles (ASCM) in flight. It was designed to fulfill the need for a vertically launched, 
extended range missile compatible with the Aegis Weapon System (AWS) to be used against 
extended range threats at-sea, near land, and overland. The SM-6 combines the tested legacy of 
STANDARD Missile-2 (SM-2) propulsion and ordnance with an active Radio Frequency (RF) 
seeker modified from the AIM-120 Advanced Medium Range Air-to-Air Missile (AMRAAM), 
allowing for over-the-horizon engagements, enhanced capability ас extended ranges, and 
increased firepower. 


Mission: Provides all-weather, anti-aircraft armament for cruisers and destroyers. The most 
recent variant of Standard Missile is SM-6, which incorporates an AMRAAM seeker for 
increased performance, including overland capability. 


FY 2018 Program: Continues production of the SM-6 variant. 


Prime Contractor: Raytheon Missile Systems; Tucson, AZ 


Standard Family of Missiles 


FY 2016* Ру 2017+ о 
Base Budget 0С0 Budget Total Request 
BRR 

RDT&E ШЕ - 120,6 - 158.6 - 158.6 - 
Procurement 4113 101 543.1 125 510.9 HT 352 8 546.1 125 
Spares 17.1 - 19 - 15.0 - - - 15.0 - 

Total 545.] 101 669.) 125 684.5 II 352 % 191 125 
* FY 2016 includes actuals for Base and ОСО. Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


MISSILES AND MUNITIONS 


5-12 
477 | 569 477 / 570 


478 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Tactical Tomahawk Cruise Missile 


Tomahawk is a long range cruise missile used for deep land-attack strike warfare that is 
launched from U.S. Navy surface combatants and submarines. Tomahawk Block IV features an 
improved navigation/guidance computer; robust anti-jam Global Positioning System (GPS) 
capabilities; increased responsiveness and flexibility via satellite communications for in-flight 
re-targeting; a loiter capability; and the ability to transmit a Battle Damage Indication (BDI) 
prior to impact. 


Block IV Tomahawk delivers a 1,000 Ib class unitary warhead at a range of 900 nm. Block IV 
Tomahawk employs inertial guidance or GPS over water to follow a preset course; once over 
land, the missile's guidance system is aided by Terrain Contour Matching (TERCOM). Terminal 
guidance is provided by the Digital Scene Matching Area Correlation (DSMAC) system or GPS, 
enabling highly accurate precision attack. 


Mission: Provides precision strike against long and medium range tactical targets. 
FY 2018 Program: Concludes production of Tomahawk Block IV missiles and continues 
preparation for mid-life recertification commencing in FY 2019. Funds the development of a 


maritime strike variant to engage surface targets. 


Prime Contractor: Raytheon Missile Systems; Tucson, AZ 


Tactical Tomahawk Cruise Missile 


FY 2016* FY 2017** АЛЕ 

Base Budget 0(0 Budget Total Request 
08 Qty $M Оу Ж Qty $M Qty $M Qty 
RDT&E 26.1 - 914 - 133.6 - - - 133.6 - 
Procurement 2023 149 271.9 1% 1344 М 100.1 66 234.5 100 
$pares 103 - 398 - 13.5 - - - BS - 
Total 299.3 149 403.1 196 | 281.5 М 100.1 66 381.6 100 

*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


MISSILES AND MUNITIONS 


5-13 


478 / 570 


479 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Trident II Ballistic Missile Modifications 


The Trident ІІ (D5) is a submarine launched ballistic missile. It provides the most 
survivable, second-strike capability in our nation’s nuclear Triad. The Trident Il 
missile is carried on the OHIO-class Fleet Ballistic Missile Submarine. The 
ongoing Life Extension Program (LEP) ensures viability of a highly 

survivable strategic deterrent through 2042, providing the ability 

to precisely attack time-critical, high value, fixed targets. The LEP 

includes the procurement of missile electronic and guidance 

Supportability Mods/Strategic Programs Alteration (SPALT) kits. 

The importance of this program as a key component to the 
sea-based leg of the nuclear triad was re-confirmed by the 
President and Congress with the ratification of the 

New START Treaty in 2011. 


Mission: Aboard a virtually undetectable platform, 
the submarine launched fleet ballistic missile deters 
nuclear war by means of assured second-strike 
capability in response to a major attack on the 
United States or its allies. 


NM. 
> 


US Navy Photo 


FY 2018 Program: Funds the development of advanced components to improve the 
reliability, safety and security of Arming, Fuzing and Firing systems and studies to support the 
National Nuclear Security Administration УУ88 ALT 370. Funds the procurement of flight test 
instrumentation, 12 Solid Rocket Motor sets, 12 Post Boost Control System Gas Generators, 
various SPALT kits, support equipment, and spares. 


Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA 


Trident ІІ Ballistic Missile Mods 


FY 2016* FY 2017** ibus 
Base Budget OCO Budget Total Request 


W Qty MQ 8 Я W $M Qty 


RDT&E 93.4 - 134.0 - 126.4 - - - 126.4 - 

Procurement 1,089.1 - 1,103.1 - 1,143.6 - - - 118.6 - 
Total 1,182.5 - 0431 - 1,270.0 - - - 1,2700 - 

*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


MISSILES AND MUNITIONS 


5-14 


479 / 570 


480 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Offensive Anti-Ship Weapon (OASUW) 


2 


©Lockheed Martin www.NavyRecognition.com 


The Offensive Anti-Ship Warfare (OASuW) Increment | is an accelerated acquisition program 
to develop the Long-Range Anti-Surface Warfare Missile (LRASM). LRASM is a precision- 
guided anti-ship missile with semi-autonomous guidance, day/night and all-weather capability. 
LRASM integrates a multi-modal sensor suite, a weapons data-link, enhanced digital anti-jam 
Global Positioning System capabilities, and а І,000ІЬ penetrator/blast fragmentation warhead. 
Increment | provides Combatant Commanders the ability to conduct Anti-Ship Warfare 
operations against high value surface combatants protected by Integrated Air Defense System 
with long range surface-to-air missiles and denies the adversary sanctuary of maneuver. The 
Increment | program has completed transition from Defense Advanced Research Projects 
Agency to Navy leadership and is scheduled to field on the Air Force В-І Bomber by the end 
of Fiscal Year 2018 and Ғ/А-ІЗЕ/Ғ by the end of Fiscal Year 2019. The OASuW Increment | isa 
joint Navy/Air Force program led by the Navy. 


Mission: Provide robust anti-surface warfare capability to ensure freedom of maneuver, 
maintain sea lines-of-communication, and extend joint warfighter combat reach in contested 
maritime environments. 


FY 2018 Program: Continue low rate production, integration, and test phase of the air- 
launched OASuW Increment | (LRASM) program. 


Prime Contractor: Lockheed Martin Missiles and Fire Control Strike Weapons; 


Orlando, FL 
FY 2016* FY 2017** 8 | 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M — Qty $M Qty 
RDT&E 348.1 - 2524 - 313.1 - - - 313.1 - 
Procurement 
Navy - - 29.6 10 14.1 25 - - 14.1 15 
Air Force - - 59.5 20 44.1 15 - - 44.1 15 
Subtotal - - 89.1 30 119.4 40 - - 119.4 40 
| Total 348.7 - 341.5 30 432.5 40 - - 425 40 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


MISSILES AND MUNITIONS 


5-15 


480 / 570 


481 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Ground Based Strategic Deterrent (GBSD) 


The Ground Based Strategic Deterrent (GBSD) program is the Air Force 
effort to replace the aging LGM-30 Minuteman Ш intercontinental ballistic 
missile (ICBM). Тһе Minuteman ПІ missile fleet was fielded in the 1970s with 
an initial 10-year service life, while its launch and command and control 
systems date back to the 1960s. The new GBSD weapon system will meet 
existing user requirements, while having the adaptability and flexibility to 
affordably address changing technology and threat environments through 
2075. Deployment is projected to begin in the late 2020s. 


Mission: As a critical part of the nuclear triad, ICBMs provide land-based 
strategic nuclear deterrence, assurance, and stability by providing a responsive 
and resilient capability that assures allies they do not need to expand their 
own capability, dissuade proliferation, deter adversaries, and, should 
deterrence fail, decisively defeat adversary targets and retaliatory capabilities 
as authorized and directed by the President. GBSD will continue to maintain 
strategic stability at a reasonable cost, while hedging against potential 
problems or vulnerabilities in other portions of the triad. 


FY 2018 Program: Funds technology maturation and risk reduction 
activities to deliver mature and integrated technologically to support the 
preliminary design of the weapon system. 


Prime Contractors: Currently in Source Selection to award up to two 
Technology Maturation and Risk Reduction contracts. 


Ground Based Strategic Deterrent (GBSD) 


FY 201 
FY 201 6% FY 2017% all 
Base Budget 000 Budget 
и еу по по $ 0 
RDT&E 65.0 - 139 - 215.7 
Procurement - - - ` ° 
Total 65.0 - 139 - 1 - - 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


MISSILES AND MUNITIONS 


5-16 


ii FY 2017 includes the Presidents Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


481 / 570 


482 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Long Range Stand-Off (LRSO) Missile 


Long Range Stand-Off (LRSO ) Missile is a nuclear cruise missile 
capable of penetrating and surviving complex advanced 
integrated air defense systems and GPS-denied environments 
from significant standoff ranges. LRSO replaces the Air 
Launched Cruise Missile (ALCM) which entered service in 
1982 and is well past its original 10-year design service life. 
LRSO details are classified to protect critical program 
information. 


Mission: The Long Range Stand Off cruise missile retains 
penetrating and survivable capabilities in advanced Integrated Air 
Defense Systems and GPS-denied environments from significant standoff ranges, ensuring we 
maintain a credible deterrent. Combined with nuclear capable bombers, LRSO provides the 
nuclear triad with a clear, visible, and tailorable deterrent to provide the President and U.S. 
Forces the ability to project power and hold at risk any target at any location on the globe. 
LRSO provides a hedge against future technological and geopolitical uncertainties. LRSO 
provides a reliable cost-effective force multiplier for the B-52, B-2 and the B-21 bomber. 


FY 2018 Program: Funds the development, design, and planning for test, integration, 
qualification and nuclear certification activities. It continues funding for the Technology 
Maturation Risk Reduction (TMRR) efforts to include the first TMRR design reviews. The next 
major milestone after TMRR award is Milestone B and Engineering Manufacturing and 
Development contract award in FY 2022. 


Prime Contractors: Currently in Source Selection to award up to two Technology 
Maturation and Risk Reduction contracts. 


Long Range Stand-Off Missile (LRSO) 


FY 2016* FY 2017** — € — 
Base Budget 000 Budget Total Request 
и Q и фу и y Mo O н (у 
RDT&E 16.1 - 95.6 - 13 - - - 43 
Procurement - - - - - - - - 
Total 16.1 - 95.6 - | 413 - - - 1 - 
* FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


*FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 
MISSILES AND MUNITIONS 


5-17 


482 / 570 


483 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


B61 Tail Kit Assembly (TKA) 


The ВбІ is a nuclear gravity bomb developed 

by the Department of Energy's National Nuclear 
Security Administration (DOE/NNSA) for the 
Department of Defense. Current versions in the 
inventory were fielded between 1978-1990 and 
require component refurbishment and replacement 
to maintain a safe, secure and effective capability. 


Mission: Provides the strategic weapons for the 

airborne leg of the nuclear triad and are carried on the B-52, the B-2, and NATO dual-use 
aircraft today. The new variant consolidates four versions and will be carried by the B-2 and 
North Atlantic Treaty Organization (NATO) aircraft as well as the F-35 and the B-21 bomber. 
To extend the life of this weapon, DOE/NNSA and the Air Force are jointly implementing a 
Life Extension Program (LEP) to refurbish the B61 with a First Production Unit іп 2020. The 
Air Force portion of the LEP is to provide the development, acquisition and delivery of a 
guided tail kit assembly and all up round technical integration, system qualification and fielding 
of the В61-12 variant. 


FY 2018 Program: Funds the development, design, test, integration, qualification and nuclear 
certification activities in support of the B61-12 LEP through continued Phase ІІ of engineering 
and manufacturing development and prepare for the Milestone C decision in early FY 2019. 
Continues software development and integration for the Ғ-ІБЕ and F-16 aircraft and begins 
B-2 and PA-200 integration. 


Prime Contractors: Boeing Company 


В61 Tail Kit Assembly (ТКА) 


FY 2016* FY 2017 dias 
Base Budget 00 Budget Total Request 
$M 0) jM и | MW 0) jM Qty 98 фу 
RDT&E 204.4 - 137.9 - 712 - - - 91.2 
Procurement - - - - 003 30 - - 883 30.0 
Total 2044 - (379 - 1795 300 - - 1795 300 
* FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


ж FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 
MISSILES AND MUNITIONS 


5-18 


483 / 570 


484 / 569 


FY 2018 Program Acquisition Costs by Weapon System 
Shipbuilding and Maritime Systems 


A central principle to the United States Maritime Strategy is forward presence, which 
promotes conflict deterrence by ensuring forces are in a position to expeditiously 
respond to conflict. Therefore, sea services must procure, build, and maintain maritime 
systems in accordance with mission need. 


The Shipbuilding Portfolio for FY 2018 includes the funding for the construction of 
12 ships (2 SSN 774 Virginia Class nuclear attack submarines; | СУМ 78 Ford Class 
Aircraft Carrier; 2 DDG 51 Arleigh Burke Class destroyers; | Littoral Combat Ships 
(LCS); | Fleet Replenishment Oiler; | Towing, Salvage and Rescue (TATS(X) ship; 
| Landing Craft, and 3 Ship to Shore Connectors) and the second year of incremental 
construction funding for | Amphibious Assault ship, USS Bougainville (НА 8). In 
addition, the FY 2018 request includes funding for Advance Procurement to support 
detail design activities and long lead items for the Columbia Class Fleet Ballistic Missile 
Submarine (SSBN) and long lead item for the Refueling and Complex Overhaul of USS 
John C. Stennis (CVN 74). 


The funding in this category finances the developmental efforts, the equipment 
procurements, and the construction of ships that will allow the U.S. Navy to maintain 
maritime dominance and superiority well into the 2 15 century. 


FY 2018 Shipbuilding and Maritime Systems – Total: $30.4 Billion 


($ in Billions) 


Surface 
i i Technology 
$14.6 Development 
$2.4 


Outfitting & Post 
Delivery 
$0.6 


Support Ships 
$0.4 


Submarine 
Combatant 
ы $8.4 


Numbers тау not add due to rounding 


SHIPBUILDING AND MARITIME SYSTEMS 


6-1 


484 / 570 


485 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


John Lewis Class Fleet Replenishment Oiler 


The Fleet Replenishment Oiler (T-AO) 


program will build a new class of fleet и |" M pr у 4 № 
oilers for the Navy. The lead ship in the == тес a MUN 
class is USNS John Lewis (T-AO 205). 

The T-AO will provide fuel and cargo 

delivery to support fleet operations. d UNUM. 


As compared to the previous class of 
Oilers, this class has increased space for 
dry cargo and a helicopter refueling а серо 
capability. The John Lewis class will be built 

with a double-hull to guard against oil spills 

and to comply with international agreements concerning pollution from ships. 


Mission: Transfers fuel and lubricants to Navy surface ships operating at sea to extend at-sea 
time for the ships and embarked aircraft. 


FY 2018 Program: Funds construction of one T-AO, continued development of ship systems, 
and outfitting costs. 


Prime Contractor: General Dynamics, National Steel and Shipbuilding Co.; San Diego, CA. 


John Lewis Class Fleet Replenishment Oiler 


FY 2016* FY 2017** BOE 
Base Budget 0(0 Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E - 11 - 20 - - - 2.0 - 
Procurement 614.1 | 13.1 - 541.1 | - - 541.1 | 
Total 674.1 | 14.2 - 543.1 | - - 543.1 | 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


я FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request юг Additional Appropriations (Base + OCO) 


SHIPBUILDING AND MARITIME SYSTEMS 


6-2 


485 / 570 


486 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


CVN 78 Gerald R. Ford Class Nuclear Aircraft Carrier 


Aircraft carriers are 
the centerpiece of 
U.S. Naval forces. 
The CVN 78 class ships will 
include new technologies and 
improvements to improve efficiency 
and operating costs as well as reduced 
crew requirements. This new class brings 
improved warfighting capability, quality-of-life 
improvements for Sailors, and reduced total 
ownership costs. USS Gerald R. Ford is the first aircraft carrier designed with all electric utilities, 
eliminating steam service lines from the ship, reducing maintenance requirements and improving 
corrosion control. The new AIB reactor, Electromagnetic Aircraft Launch System (EMALS), 
Advanced Arresting Gear (AAG) and Dual Band Radar (DBR) all offer enhanced capability with 
reduced manning. The ship's systems and configuration are optimized to maximize the sortie 
generation rate (SGR) of attached strike aircraft. 


Mission: Provides the United States with the core capabilities for forward presence, 
deterrence, sea control, power projection, maritime security and humanitarian assistance. The 
Gerald R. Ford class will be the premier forward asset for crisis response and early decisive 
striking power in a major combat operation. 


FY 2018 Program: Funds the first year of construction costs for USS Enterprise (CVN 80); 
the final year of construction costs for USS John Е Kennedy (СУМ 79), outfitting, training, and 
continued development of ship systems. 


Prime Contractor: Huntington Ingalls Industries; Newport News, VA 


CVN 78 Gerald R. Ford Class Nuclear Aircraft Carrier 


FY 2016* FY 2017** EE. SENE 
Base Budget 0(0 Budget Total Request 


м 60у м Qy по M W $M Q 


RDT&E 113.6 - ЛЕ - 138.1 - - - 138.1 

Procurement 2,655.2 - 26696 - 4500 | - - 4500.0 | 
Total 2,168.1 - 1191 - 4638.1 | - - 408 | 

*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO) 


SHIPBUILDING AND MARITIME SYSTEMS 


6-3 


486 / 570 


487 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


DDG 51 Arleigh Burke Class Destroyer 


The DDG 51 class guided missile 
destroyers provide a wide range of 
warfighting capabilities in multi-threat 
air, surface, and subsurface environments. 
The DDG 51 class ship is armed with 

a vertical launching system, which 
accommodates 96 missiles, and 

a 5-inch gun that provides Naval Surface 
Fire Support to forces ashore and anti-ship 
gunnery capability against other ships. 

This is the first class of destroyers i 
with a ballistic missile defense capability. The Arleigh Burke class is comprised of four separate 
variants; DDG 51-71 represent the original design, designated Flight | ships, and are being 
modernized to current capability standards; DDG 72-78 are Flight ІІ ships; DDG 79-123 
ships are Flight ПА ships; DDG 124-136 will be constructed as Flight Ш ships with the Air and 
Missile Defense Radar (AMDR) capability. 


US Navy Photo 


Mission: Provides multi-mission offensive and defensive capabilities and can operate as part of 
a carrier strike group or independently. Conducts Anti-Air Warfare, Anti-Submarine Warfare, 
and Anti-Surface Warfare. 


FY 2018 Program: Funds two Flight Ill DDG 51 class destroyers as part of a multiyear 
procurement for ten ships from FY 2018 — FY 2022, outfitting costs, and continued 


development of ship systems. 


Prime Contractors: General Dynamics Corporation; Bath, ME 
Huntington Ingalls Industries; Pascagoula, MS 


DDG 51 Arleigh Burke Class Destroyer 


FY 2016* FY 2017** ЕЕ 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 2131 - 1494 - 2882 - - - 288.2 
Procurement 4266.8 3 3,348.9 2 3,725.6 2 - - 3,725.6 2 
Total 4,540.5 j 3,4983 2 4013.7 2 - - 4,013.7 2 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


SHIPBUILDING AND MARITIME SYSTEMS 


487 / 570 


488 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Littoral Combat Ship (LCS) 


The Littoral Combat Ship (LCS) is a 
small surface combatant capable of operations 2. 
eneral Dynamics 

close to shore. The design emphasizes speed, independents Ce ie 
4.14: ж уеп Numbers { 

flexibility, and shallow draft. The LCS is 

designed for operations in three primary 

anti-access mission areas: Surface Warfare (SUW) š 

operations emphasizing defeat of small boats, 

Mine Warfare (MIW), and Anti-Submarine 

Warfare (ASW). The ships are reconfigured 

for various operational roles by changing the 

mission module, each of which have mission 

area-specific equipment, vehicles, and crews. Image courtesy 

: Lockheed Martin 
The modules are used to counter anti-access Freedom Class (LCS 1) 
. . i Odd Numbers 

threats close to shore such as mines, quiet diesel 

submarines, and swarming small boats. The seaframe 

acquisition strategy procures two seaframe designs which are a separate and distinct 

acquisition program from the mission module program. The two programs are synchronized to 

ensure combined capability. 


Mission: Defeats asymmetric threats and assures naval and joint forces access into contested 
littoral regions by prosecuting small boats and craft, conducting mine countermeasures, and 
performing anti-submarine warfare. 


FY 2018 Program: Funds construction of one LCS seaframe, outfitting, trainers, and 
development costs for a new class of small surface combatant. 


Prime Contractors: Lockheed Martin/Marinette Marine Corporation; Marinette, WI 
Austal USA; Mobile, AL 


Littoral Combat Ship 


FY 2016* FY 2017** ЕСЕ | 
Base Budget ОСО Budget Total Request 
M бу $ — Qy $ и я Qy н бу 
RDT&E 1284 - 1365 - 1844 - - - 184.4 - 
Procurement 1,688.3 3 1,462.4 2 968.1 | - - 968.1 | 
Total 1,816.7 3 1,598.9 2 1,152.6 | - - 1,152.6 | 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


SHIPBUILDING AND MARITIME SYSTEMS 


488 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


SSN 774 Virginia Class Submarine 


The Virginia Class Submarine is a 
multi-mission nuclear-powered 
attack submarine that provides 
the Navy with the capabilities 
to maintain undersea 
supremacy in the 215< century. 
Characterized by advanced 
stealth and enhanced features for 

Special Operations Forces, this submarine is able to operate in deep water and littoral 
environments. Equipped with vertical launchers and torpedo tubes, the submarine is able to 
launch Tomahawk cruise missiles as well as heavyweight torpedoes. 


US Navy Photo 


Mission: Seeks and destroys enemy ships and submarines across a wide spectrum of scenarios, 
working independently and in concert with a battle group, separate ships, and independent 
units. Provides theater commanders with time sensitive critical information for accurate 
knowledge of the battlefield. 


FY 2018 Program: Funds two ships as part of a multiyear procurement contract, advance 
procurement for two ships in future years, and outfitting and support equipment. Continues 
funding the development of the Virginia Payload Module, technology, prototype components, and 
systems engineering required for design and construction. 


Prime Contractors: General Dynamics Corporation; Groton, CT 
Huntington Ingalls Industries; Newport News, VA 


SSN 774 Virginia Class Submarine 


FY 2016* FY 2017** Е 208 
Base Budget 0C0 Budget Total Request 
| 5М Qty $M Qty $M Qy SM Qty $M Qty 
RDT&E 305.1 - 208.5 - 190.3 - - - 190.3 - 
Procurement 5,424.5 2 5,113.9 2 5,356.0 2 - - 5,356.0 2 
Total 5,729.5 2 5,322.3 2 5,546.3 2 - - 5,546.3 2 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


SHIPBUILDING AND MARITIME SYSTEMS 


6-6 
489 / 569 489 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Ship to Shore Connector 


The Ship to Shore Connector (SSC) is the 
functional replacement for the existing fleet 

of Landing Craft, Air Cushioned (LCAC) vehicles, 
which are nearing the end of their service life. 

The SSC is an air-cushioned landing craft intended 
to transport personnel, weapon systems, equipment, 
and cargo from amphibious vessels to shore. 

The vessel can rapidly move assault forces to 
conduct amphibious operations and operate 

over the high water mark to include movements over 
ice, mud, and swamps. 


Image 
courtesy of 
the U.S. Navy 


Mission: Transports vehicles, heavy equipment, and supplies through varied environmental 
conditions from amphibious ships to shore. Enhances the Navy and Marine Corps capability to 
execute a broad spectrum of missions from humanitarian assistance and disaster response to 
multidimensional amphibious assault. 


FY 2018 Program: Procures three vessels and continues research, development, and testing. 


Prime Contractor: Textron Incorporated; New Orleans, LA 


Ship to Shore Connector 


FY 2016* FY 2017** Lec 
Base Budget 00 Budget Total Request 


м 05 W — Qty м Qy 5 0 $M — Qty 


RDT&E 18 - ІШ - 224 - - - 22.4 - 

Procurement 210.6 5 128.1 2 222.7 3 - - 2M1 3 
Total 218.4 5 139.2 2 245.1 3 - - 245.1 3 

*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Маг 2017 Request for Additional Appropriations (Base + ОСО) 


SHIPBUILDING AND MARITIME SYSTEMS 


6-7 


490 / 569 490 / 570 


491 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Columbia Class Ballistic Missile Submarine Program 


The Columbia Class Ballistic Missile Submarine 

is designed to replace the current Ohio class em 
of Fleet Ballistic Missile Submarine (SSBN). Courtesy of 
The USS Columbia program will deliver — U.S: Nawy 
12 SSBNSs with the necessary capability 

and capacity to meet the sea based strategic 
deterrence mission beyond retirement of the 
current submarine force and with sufficient mission 
capability to counter credible threats through 2080. 
Currently in the research and development stage, the Columbia 
class requirements and specifications are being refined. The ships 

will begin construction in FY 2021 for FY 2028 delivery when the first Ohio class ships are due 
to be decommissioned. The nuclear propulsion systems will be acquired from the nuclear 
industrial base under the direction of Naval Reactors, under U.S. Department of Energy 
authorities. The program includes the development and construction of a Common Missile 
Compartment (CMC) capable of hosting the existing TRIDENT Il missile system, which is 
conducted jointly with the United Kingdom (UK) to support the SUCCESSOR class SSBN. 


Mission: Provides a sea-based strategic nuclear force. 
FY 2018 Program: Funds advance procurement for long-lead items, detail design, and 
research and development of nuclear technologies and ship systems such as the propulsion 


system, combat systems technology, and the common missile compartment. 


Prime Contractor: Common Missile Compartment Design: General Dynamics; Groton, CT 


Columbia Class Ballistic Missile SubmarineProgram 


FY 2016* FY 2017** Да 
Base Budget OCO Budget Total Request 
$M Qty 5М Qty $M Qty $M Qty $M Qty 
RDT&E 1,367.1 - 1,091.1 - 1,041.6 - - - 1,041.6 - 
Procurement - - 173.1 - 842.9 - - - 842.9 - 
Total 1,367.1 - 1,864.3 - 1,884.5 - - - 1,884.5 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO) 


SHIPBUILDING AND MARITIME SYSTEMS 


6-8 


491 / 570 


492 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


CVN Refueling Complex Overhaul 


The CVN Refueling Complex 7 «ди 
Overhaul (КАСОН) Ше 

extension program provides 

for the modernization of 
nuclear powered fleet aircraft 
carriers. During the RCOH, 

the nuclear fuel is replaced 

and major system modernization 
activities are implemented to 
extend the useful operational 

life of the ship. An RCOH is 
performed midway through 

the ship's lifespan, which, 

for Nimitz class carriers, is approximately 25 years, and can take four years to complete. 


Photo 
Courtesy of 
Northrop 
Grumman 


Mission: Refuel and upgrade the Nimitz class aircraft carriers at mid-life to ensure reliable 
operations during the remaining ship life. 


FY 2018 Program: Continues funding for the RCOH for USS George Washington (CVN 73) 
and procurement of long-lead items and long-lead efforts for USS John C. Stennis (CVN 74) 
scheduled to begin in FY 2020. 


Prime Contractor: Huntington Ingalls Incorporated; Newport News, VA 


CVN Refueling Complex Overhaul 


FY 2016* FY 2017** EE 
Base Budget 0(0 Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E : Е | U ; E - Е : 
Procurement 612.6 | 1,991.8 - 1,680.8 - - - 1,680.8 - 
Тота! 612.6 | 1,991.8 - 1,680.8 - - - 1,680.8 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request * Nov 2016 Amendment * Mar 2017 Request for Additional Appropriations (Base * OCO) 


SHIPBUILDING AND MARITIME SYSTEMS 


6-9 


492 / 570 


493 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


LHA America Class Amphibious Assault Ship 


USS America class ships are 

large-deck, amphibious assault ships designed 
to land and support ground forces. 
This class can transport a combination 
of helicopters and vertical 
take off and landing aircraft. , 
The first two ships, America 
(LHA 6) and USS Tripoli 
(LHA 7), are designated as 
Flight 0 Variants and include - 
an enlarged hangar deck, enhanced aviation maintenance facilities, increased aviation fuel 
capacity, and additional aviation storerooms as compared to the previous Tarawa (LHA 1) class 
ships. USS Bougainville (LHA 8) will be designated the first Flight | ship and will reincorporate 
a well deck for operational flexibility. The well deck will enable surface operations while 
maintaining the aviation capabilities. 


Mission: Provides forward presence and power projection as an integral part of joint, 
interagency, and multinational maritime expeditionary forces. Operates for sustained periods 
in transit to and operations in an Amphibious Objective Area to include the embarkation, 
deployment, and landing of a Marine Landing Force and supporting forces by helicopters and 
tilt rotors supported by Joint Strike Fighters F-35B. 


FY 2018 Program: Continues construction funding of LHA 8, outfitting costs, and continuing 
research and development efforts. 


Prime Contractor: Huntington Ingalls Industries Incorporated; Pascagoula, MS 


LHA America Class Amphibious Assault Ship 


FY 2016* FY 2017** ИВО | 0 ENS 
Base Budget OCO Budget Total Request 
W 0 м Qty М оу Я Qy $M Qty 
RDT&E 83 - 95 - 82 - - - 8.2 - 
Procurement 4992 - 1,638.8 | 1,1401 - - - 1,740.1 - 
Total 491.5 - 1,648.2 | 1,748.3 - - - 1,148.3 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


SHIPBUILDING AND MARITIME SYSTEMS 


6-10 


493 / 570 


494 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Space Based Systems 


Space assets support deployed U.S. forces by providing communications services, 
navigation capabilities, and information collected by remote sensors such as weather 
satellites and intelligence collection systems. Space forces contribute to the overall 
effectiveness of U.S. military forces by acting as a force multiplier that enhances combat 
power. This investment addresses growing threats, complicating an adversary's ability 
to counter U.S. space superiority, while enhancing the Department's ability to identify, 
characterize, and attribute all threatening actions in space. The capability to control 
space contributes to achieving information superiority and battle space dominance. 
Procurement of launch vehicles and launch services are typically funded 2 years prior to 
launch. Generally speaking, the first two satellites of a new system are purchased 
with Research, Development, Test and Evaluation (RDT&E) funding and the remainder 
of the satellites are purchased with Procurement funding. 


The FY 2018 budget highlights concludes incremental funding for procurement of the 
Space Based Infrared System (SBIRS) space vehicles Geosynchronous Earth Orbit 
(GEO)-5 and GEO-6, awarded June 2014; provides advance procurement for GEO-7 and 
СЕО-8; continues funding for the production oversight of the Advanced Extremely High 
Frequency (AEHF) space vehicles AEHF-5 and AEHF-6, and continues the Space 
Modernization Initiative RDT&E activities. Also funds the procurement of Evolved 
Expendable Launch Vehicle (EELV) Launch Services, specifically three launch vehicles, and 
up to eight Launch Capability activities per year. 


FY 2018 Space Based Systems - Total: $9.8 Billion 


($ in Billions) 


Support 
$3.2 


Satellites 
$4.7 


Launch 
$1.9 


Does not include MDA or S&T Space related funding 
SPACE BASED SYSTEMS 


7-1 


494 / 570 


FY 2018 Program Acquisition Costs by Weapon System 


Advanced Extremely High Frequency 


The Advanced Extremely 

High Frequency (AEHF) 

system will be a four satellite 
constellation of communications 
satellites in geosynchronous orbit 
that will replenish the existing EHF system, 
Military Strategic Tactical Relay (MILSTAR), 
at a much higher capacity and data rate capability. 


* 24-hour low, medium, and extended data rate satellite 
connectivity from 65 N to 65 S latitude worldwide 


* 8 full-time spot beam antennas @ 75 bps to 8.192 Mbps data rate 

* 24time-shared spot beam coverages @ 75 bps to 2.048 Mbps data rate 
* 2crosslink antennas per satellite (60 Mbps) 

° AEHF-I, AEHF-2, and AEHF-3 are in orbit and operational 


* The launch of AEHF-4 is planned for 2017; AEHF-5 and AEHF-6 are scheduled to replace 
АЕНҒ-І and AEHF-2 at the end of their useful life 


Mission: Provides survivable, anti-jam, low probability of detection/intercept, worldwide secure 
communications for tactical and strategic users and provides additional protection for strategic 
users against shocks from a nuclear attack. AEHF enables tactical users to obtain battlefield 
maps, share targeting data, and conduct voice calls. AEHF is a collaborative program that also 
includes resources for Canada, the United Kingdom, and the Netherlands. 


FY 2018 Program: Continues funding for the production oversight of the space vehicles 
AEHF-5 and AEHF-6, and continues selected MILSATCOM Space Modernization Initiative (SMI) 
development activities which are focused on improving capabilities, to include AEHF system 
operational resiliency. 


Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA 


Advanced Extremely High Frequency 


FY 2016* FY 2017** PPP” | s 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 208.1 - 259.1 - 145.6 - - - 145.6 
Procurement 3214 - 645.6 - 514 - - - 51.0 
Total 535.5 - 904.7 - 202.6 - - - 202.6 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + OCO) 


SPACE BASED SYSTEMS 


7-2 


495 / 569 495 / 570 


496 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Evolved Expendable Launch Vehicle 


The Evolved Expendable Launch Vehicle (EELV) 
provides to the Air Force, Navy, and the 

National Reconnaissance Office (NRO), 

and other government and commercial purchasers of 
launch services medium to heavy lift class satellites. 


* 70 consecutive successful national security space 
(NSS) operational launches (as of March 19, 2017). 

* TheAir Force certified SpaceX as an EELV provider 
on May 19, 2015. 


Mission: Provides launch services and capability for medium 
to heavy class national security space satellites. 


FY 2018 Program: Procures three Air Force launch 
services. All three are planned for competition and which 
are usually ordered no-later-than 24 months prior to the 
planned mission unless additional first time integration is 
needed; funds EELV Launch Capability (ELC) effort 
including mission assurance, program management, 
systems engineering, integration of the space vehicle with 
the launch vehicle, launch site and range operations, and 
launch infrastructure maintenance and sustainment. 
Continues EELV launch service investment to provide 
two commercially-viable, domestically-sourced space 
launch service providers with the objective of eliminating 
reliance on a foreign-made liquid rocket engine. 


Delta IV 
Heavy 


Atlas V 


Falcon 9 


Photo 


courtesy 
Of SpaceX 
Photos 
courtesy 
Of ULA 


Prime Contractors: United Launch Alliance (ULA); Centennial, CO 


SpaceX; Hawthorne, CA 


Evolved Expendable Launch Vehicle 


FY 2016* FY 2017** А. 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 2249 - 296.6 - 291.6 291.6 - 
Procurement 1,250.9 4 1,506.4 5 1,563.9 3 1,563.9 3 
Total 1,475.8 4 1,803.0 5 — 15 3 - - 1,8615 J 


*FY 2016 includes actuals for Base and OCO 


Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


SPACE BASED SYSTEMS 


496 / 570 


497 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Global Positioning System 


The Global Positioning System (GPS) 
provides world-wide, 24-hour a day, NDS 5 
all weather 3-dimensional position, navigation, ^ (>... € - қы dia n 
and precise timing (PNT) information for ; ; IN XEN Ф. 

military and civil users. The GPS III 
space vehicles will be fully backward 
compatible with legacy signals while 
delivering new capabilities and 
enhancements to include a new 
Galileo-compatible signal (civil), a 
more powerful M-code (military) signal, and the possibility to on-ramp future capabilities. The 
GPS Next Generation Operational Control System (OCX) will enable operational use of all 
modernized GPS signals, as well as enabling improved PNT performance. 


Mission: Provides worldwide PNT to military and civilian users. 


FY 2018 Program: Funds launch campaign for GPS Ш Space Vehicles (SVs) 01 and 02, and 
design maturation supporting SV 11+. Continues the development of GPS OCX Blocks | and 2, 
and enhancements to the legacy Operational Control System prior to OCX delivery. Funds the 
technology development and lead platform integration of Military GPS User Equipment (MGUE) 
Increment |. Funds the GPS Program Office's responsibility as the Prime Integrator (Enterprise 
Integration) to synchronize space, control, and user segment programs and manage civil/military 
specifications and requirements. 


Prime Contractors: GPS Ill: Lockheed Martin Corporation; Denver, CO 
GPS OCX: Raytheon Company; Aurora, CO 
GPS MGUE Inc |: L3 Interstate Electronics Corporation; Anaheim, CA 
Rockwell Collins International; Cedar Rapids, IA 
Raytheon Company; El Segundo, CA 


Global Positioning System 


FY 2016* FY 2017** аиы 
Base Budget OCO Budget Total Request 
$M 0 $MM — Qy $M Qty $M Qty $M Q 
RDT&E 634.7 - 910.6 - 1,018.3 - - - 1,0183 - 
Procurement 198.4 | 34.1 - 85.9 - - - 85.9 - 
Total 833.1 | 1,004.7 - 1,1042 - - - 1,104.2 - 
*FY 2016 includes actuals for Base and ОСО Numbers may not add due to rounding 


**FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


SPACE BASED SYSTEMS 


497 / 570 


498 / 569 


FY 2018 Program Acquisition Costs by Weapon System 


Space Based Infrared System (SBIRS) 


Space Based Infrared System (SBIRS) 

will field a four satellite constellation Б > 

in Geosynchronous Earth Orbit (GEO) Е аы... of Lockheed Martin 

and a two hosted payload constellation A; — es = 

in Highly Elliptical Orbit (HEO) with АЎ A E > —s 

an integrated centralized ground š — ;- 4 Z ss 

station serving all SBIRS space elements. | | 

The SBIRS is the follow-on system to the 

Defense Support Program (DSP). 

The GEO payload consists of a scanning infrared (IR) sensor, which provides a higher revisit 

rate, and a staring IR sensor, which provides a higher fidelity and persistent coverage for areas 

of interest. The HEO payload consists of a single IR sensor. 

° The HEO-3 payload was delivered to the host satellite program in June 2013 and is now on 
orbit; the HEO-4 payload was delivered in May 2015. 

* The GEO-3 satellite is expected to be delivered from storage for launch as early as 
November 2017 as SBIRS Flight 4 and the GEO-4 satellite was delivered directly from 
production and launched on January 20, 2017 as SBIRS Flight 3. 

e The GEO-5 and СЕО-6 satellites are scheduled to launch in 2021 and 2022 as 
replenishment satellites for GEO-| and GEO-2 at the end of their useful lives. 


Mission: Provides initial warning of strategic missile attack on the United States, its deployed 
forces, and its allies. Supports missile defense, battlespace awareness, and technical intelligence. 


FY 2018 Program: Concludes incremental funding for procurement of the space vehicles 
GEO-5 and GEO-6, awarded June 2014; provides advance procurement for GEO-7 and GEO-8; 
and funds ground segment development, and continues the Space Modernization Initiative (SMI) 
development activities to reduce future production costs by improving insertion of new 
technologies to replace obsolete parts and materials. 


Prime Contractor: Lockheed Martin Corporation; Sunnyvale, CA 


Space Based Infrared System 


FY 2016* FY 2017** AE 
Base Budget OCO Budget Total Request 
$M Qty $M Qty $M Qty $M Qty $M Qty 
RDT&E 291.5 - 218.8 - 311.8 - - - 311.8 - 
Procurement 542.1 - 362.5 - 1,113.4 - - - 1,113.4 - 
Total 8342 - 581.3 - 1,425.3 - - - 0414253 - 
*FY 2016 includes actuals for Base and OCO Numbers may not add due to rounding 


= FY 2017 includes the President's Budget request + Nov 2016 Amendment + Mar 2017 Request for Additional Appropriations (Base + ОСО) 


SPACE BASED SYSTEMS 


7-5 


498 / 570 


499 / 569 


7-6 


5 A 


m 
e = li : 
А 
КА < > С 
STATES OY 


This page intentionally left blank. 


499 / 570 


= А. 
ج‎ ў 


144141111 
11110 ШШ 


ИИ» 
ООО w 
“ Е 
A - — ы. 


: ТАЛЫЫ 814111111! ret 1011111 
ТТТ 201017 р 0 m 


ШІНШІ 
ОООО 


500 / 57( 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


501 / 569 501 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


502 / 569 502 / 570 


UNCLASSIFIED 


The 60 Minute Network Security Guide 


(First Steps Towards a Secure Network Environment) 


Systems and Network Attack Center (SNAC) 


October 16, 2001 
Version 1.0 


National Security Agency 
9800 Savage Rd. Suite 6704 
Ft. Meade, MD 20755-6704 


SNAC.Guides@nsa.gov 


Some parts of this document were drawn from Microsoft and 
The SANS Institute copyright materials with their permission. 


UNCLASSIFIED 


503 / 569 


503 / 570 


Table 1: 
TCP or UDP Servers to Completely Block at the Perimeter Router/Firewall 


Portis) (Transport) | Server | Port(s) (Transport) | Serer | 
12-6 & 
3 


ТІ (TCP z UDP) 2023 (TCP) 
15 (TCP = UDP) 2115 (TCP) 
u 


2049 (TCP Е ОБР) 

2583 (ТСР) WinCrash 

3701 (TCP z DE] 

2801 (ICE) 
137 (ТСР s UDP) Тоска 


138 (ТСР & UDP) netbios-dgm 5800 - 5899 (ТСР) winvnc web 
server 


37 (TCP в UDP) 2301 (TCP в UDP) compagdiag 


т 
m 


139 (ТСР в UDP) 5900 - 5999 (TCP) | winne 


UDP) xdmcp 6000 - 6063 (ТСР) X11 Window 
System 


177 (TCP 


0 
m 


245 (ТСР = UDP) irc 
512 (TCP) Subseven 
513 (ТСР) 6776 (ТСВ) Subseven 
513 (UDP) 7000 (ТСР) Subseven21 


514 (TCP) rsh, кср, 12345 - 12346 NetBus 
rdist, rdump, (TCP) 
rrestore 


515 (ТОР) Sracheldraht 


1024 (ТСР) NetSpy 31337 - 31338 (ТСР Back Orifice 
& UDP) 

1045 (ТСР) Rasmin 32700 - 32900 (ТСР RPC services 
a UDP) 


33270 (ТСР) Trinity V3 
[ — 1243 (IC) | Backdoorn-G |  ăć 
VooDoo Dii | | | 
1348 (UDP) Back Orifice 
DLL 
ЕТР99СМР 


а UDE) 
1807 (TCB) 


293 / 340 309 / 570 


UNCLASSIFIED 


Table of Contents 


TABLE OF CONTENDS ———————————————  ÀSHnÓ 2 
ludielUese,m—————————————————————— Á 4 
GENERAL GUIDANCGE.................................... l... ...................................................................................... 5 
SECURITY POLIC ЖЕКТЕ ТЕР ua e оао 5 
OPERATING SYSTEMS AND APPLICATIONS: VERSIONS AND УРБАТЕЗ............. лилии 5 
KNOW YOUR NETWORK uisus ossa pa адан ни citate e вино omo 6 
TCP/UDP SERVERS AND SERVICES ON THE NETWORK ........... линии 6 
PASSWORDS MENT cT 6 
Do Мот RUN CODE FROM NON-TRUSTED SOURCES .............4..4401.2.4ТҮ8:020.006060. 802012010 tnter tnnt trennen ns 7 
BLOCK CERTAIN E-MAIL ATTACHMENT TYPES ........ccccscscscssssesesesesesecsesavassesavavsssssesesecsesasassesesesecacsesaacseaeeeeaes 7 
FOLLOW THE CONCEPT OF LEAST РБІМПЕСЕ..............аа а ааа а аа тата tnter а 7 
APPLICATION AUDITING................. sical далда лады pr Dainese i Ue она sasaki 8 
NETWORK PRINTER_..... И rep pU basa a aaa 8 
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP).................. I n a tents 8 
NETWORK SECURITY TESTING оное раба иран d Edd ean 8 
PERIMETER ROUTERS AND FIREWALLS ............................................ u. nn nn nn nn nn nn nn u... ....... 9 
HOST Е ҮК ЛОК ons о О Л ой О О О Г E 9 
TCP/IP: Riz c ——————————————— 11 
LOGGING AND DEBUGGING..........ccssscsssssssscscsesssssesesesesecseseseseesesssssssseseceseesasesessssesecescecsesssesaesesesecaeseeeceeaenens 19 
GENERAL ize v VIN wie REM 21 
WINDOWS NT 4.0 AND WINDOWS 2000 ....................2.  .. cere rere .......а44.......... 22 
SERVICE PACKS AND HOTFIXES оаа анна бырына қаттық ланды қылды Re ula E нинин ннан 22 
LIST OF NT/WINDOWS 2000 SECURITY MEASURES.................. I 101 nnne tnnt tnter 23 
MICROSOFT 2 dB vgle] le 25 
UNIX NETWORKS isd asia aad ——————————— 25 
STARTUP SCRIPTS se RT e Ri e a D atu 25 
SERVIGES/PORES Sessa e Ea elect ce Fl sb ие Qu Edda 25 
SYSTEM ТЕШӘ NR hua us tup E E E E nen DU айнадан 26 

R COMMANDS RU dut Ims а Па aU nda NT RUM uu E uda a ana B 26 
NETWORK CONFIGURATIONS гоа пае ое оао еа ене данене анана ae acetate Und uu adea 26 
PATCHES ЕЕ e ЕВ ИЕККЕ 26 
USER:AGGOUNTS аео ает putain ea 26 
PERMISSIONS ы ыдыс SS ыды арыр ыл Ана ыбаа ылына 27 
GRONIAT JOBS M RIP 27 
CORE DUMPS е SS SE КИ н 27 
NETWORK SERVICES C. ыы eh sea Sse n aa a ae a 27 
oct PIE -——————— — ВЕ usuku 28 
X-WINDOW EST eX Z2 S RM 28 
DISTRIBUTED SERVER FUNCTIONS „ааа анааан надана ИЕККЕ ККЕ se Pu i rand 28 
CHROOT ENVIRONMENTS.................. I ен нике ити n n nn нна YE ERU KE өнеді 29 
INTERESTING FILES Wem RM 29 
PERIPHERAL DEVICE Sirain оо ausum aaa ad maf ое а abis rasa amas абы 29 
BUFFER OVERFLOWS о о ua cvs нысы аб ба Адан Ыйы на шд d Cinta EHE RUE 29 
SYSTEM UTILITIES AND COMMANDS а.а аланла аана аакка нана ава аа ааа 29 
CURRENT OS PACKAGES BERE 29 
Rime ES NL D ЕКЕЛУ КК cT 30 
UNIX WEB SERVERS.......... арында санына ынаны: 31 
UNCLASSIFIED 2 


504 / 569 504 / 570 


UNCLASSIFIED 


(GENERAL GUIDANGE qaf ans —————————————————— م‎ НЕ 31 
EXAMPLE: (APACHE J кез НА و‎ О О Г ГУС. 31 
INTRUSION DETECTION SYSTEMS (IDS) ............................................-.-- Н 33 
STEP 1 - IDENTIFY WHAT NEEDS ТО ВЕ РЕОТЕСТЕО............ненененененненененененнне 33 
STEP 2 - DETERMINE WHAT TYPES OF SENSORS ARE REQUIRED ................м.. лымы 33 
STEP З - CONFIGURE HOST SYSTEM SECURELY .........:. еее ы. 33 
STEP 4 - KEEP SIGNATURE DATABASE CURRENT ................ М е лчееее г ы. 33 
STEP 5 - DEPLOY IDS SENSORS Неее ne no сода Egg o RA SER ӨЙ a ao ae e 33 
STEP 6 - MANAGEMENT AND CONFIGURATION ....................4 4441. із рге ерегес ини иене ныны ныны 35 
UNCLASSIFIED 3 


505 / 569 505 / 570 


506 / 569 


UNCLASSIFIED 


Introduction 


During the last four years the National Security Agency's Systems and Network Attack Center 
(C4) has released Security Guides for operating systems, applications and systems that 
operate in the larger IT network. These security guides can be found at our web site 
www.nsa.gov / Security Recommendation Guides. Many organizations across the 
Department of Defense have used these documents to develop new networks and to secure 
existing IT infrastructures. This latest Security Guide addresses security a bit differently. Our 
goal is to make system owners and operators aware of fixes that become "force multipliers" in 
the effort to secure their IT network. 


Security of the IT infrastructure is a complicated subject, usually addressed by experienced 
security professionals. However, as more and more commands become "wired", an 
increasing number of people need to understand the fundamentals of security in a networked 
world. This Security Guide was written with the less experienced System Administrator and 
information systems manager in mind, to help them understand and deal with the risks they 
face. 


Opportunistic attackers routinely exploit the security vulnerabilities addressed in this 
document, because they are easily identified and rarely fixed. ISSMs, ISSOs and System 
Administrators provide a level of risk management against the multitude of vulnerabilities 
present across the IT infrastructure. The task is daunting when considering all of their 
responsibilities. Security scanners can help administrator identify thousands of 
vulnerabilities, but their output can quickly overwhelm the IT team's ability to effectively use 
the information to protect the network. This Security Guide was written to help with that 
problem by focusing the experience our research and operational understanding of the DoD 
and other US Government IT infrastructures. 


This Security Guide should not be misconstrued as anything other than security "best 
practices" from the National Security Agency's Systems and Network Attack Center (C4). We 
hope that the reader will gain a wider perspective on security in general, and better 
understand how to reduce and manage network security risk. 


We welcome your comments and feedback. SNAC.Guides@nsa.gov 


UNCLASSIFIED 4 


506 / 570 


507 / 569 


UNCLASSIFIED 


General Guidance 


The following section discusses general security advice that can be applied to any network. 


Security Policy 


(This section is an abstract of the security policy section of RFC 2196, Site Security 
Handbook. Refer to this RFC for further details.) 


A security policy is a formal statement of the rules that people who are given access to an 
organization's technology and information assets must abide. The policy communicates the 
security goals to all of the users, the administrators, and the managers. The goals will be 
largely determined by the following key tradeoffs: services offered versus security provided, 
ease of use versus security, and cost of security versus risk of loss. 


The main purpose of a security policy is to inform the users, the administrators and the 
managers of their obligatory requirements for protecting technology and information assets. 
The policy should specify the mechanisms through which these requirements can be met. 
Another purpose is to provide a baseline from which to acquire, configure and audit computer 
systems and networks for compliance with the policy. In order for a security policy to be 
appropriate and effective, it needs to have the acceptance and support of all levels of 
employees within the organization. 


A good security policy must: 
m Бе able to be implemented through system administration procedures, publishing of 
acceptable use guidelines, or other appropriate methods 


m Ве able to be enforced with security tools, where appropriate, and with sanctions, where 
actual prevention is not technically feasible 


m Clearly define the areas of responsibility for the users, the administrators, and the 
managers 


m Be communicated to all once it is established 


m Бе flexible to the changing environment of a computer network since it is a living 
document 


Operating Systems and Applications: Versions and Updates 


As much as possible, use the latest available and stable versions of the operating systems 
and the applications on all of the following computers on the network: clients, servers, 
Switches, routers, firewalls and intrusion detection systems. Keep the operating systems and 
the applications current by installing the latest updates (e.g., patches, service packs, 
hotfixes), especially updates that correct vulnerabilities that could allow an attacker to 
execute code. Note that some updates may not be applied to the computer until a reboot 
occurs. The following applications should be given particular attention because they have 
been frequently targeted (e.g., by CodeRed, Melissa virus, Nimda): IIS, Outlook, Internet 
Explorer, BIND and Sendmail. 


UNCLASSIFIED 5 


507 / 570 


508 / 569 


UNCLASSIFIED 


Know Your Network 


Developing and maintaining a list of all hardware devices and installed software is important 
to the security of the IT infrastructure. Understanding software applications that are installed 
by default is also important (e.g., IIS is installed by default by SMS and SQL Server on 
Windows platforms). A quick method for taking inventory of services running on the network 
is to port scan. 


TCP/UDP Servers and Services on the Network 


Scan the network for all active TCP/UDP servers and services on each computer in the 
network. Shut down unnecessary servers and services. For those servers that are 
necessary, restrict access to only those computers that need it. Turning off functional areas, 
which are seldom used but have vulnerabilities, prevents an attacker from being able to take 
advantage of them. Other applications install with sample CGI scripts, which sometimes 
contain problems. As a general rule do not install sample applications in production systems. 


Passwords 


Poor password selection is frequently a major problem for any system's security. Users 
should be forced to change their passwords regularly. Set up password aging via Account 
Policy for Windows systems or the /etc/default/passwd file in UNIX. Administrators 
should obtain and run password-guessing programs (i.e., “John the Ripper," “LOphtCrack,” 
and “Crack”) frequently to identify those users having easily guessed passwords. Because 
password cracking programs are very CPU intensive and can slow down the system on 
which it is running, it is a good idea to transfer the encrypted passwords (the dumped SAM 
database for Windows and the /etc/passwd and /etc/shadow files in UNIX) to a stand- 
alone (not networked) system. Also, by doing the work on a non-networked machine, any 
results found will not be accessible by anyone unless they have physical access to that 
system. 


Passwords should: 


m Ве 120r more characters in length on Windows systems, 8 characters in length on UNIX 

m Include upper and lower case letters, numbers, and special characters 

m Not consist of dictionary words 

m Ве changed regularly (every 30 to 90 days) 

m For UNIX, be encrypted and stored in the /etc/shadow file (for some UNIX systems) with 
permissions set to 400 with ownership by root and group sys. The /etc/passwd file 
should have permissions 644 with owner root and group root. 

m Ве cracked every month to find users choosing easily guessed or cracked passwords 

For UNIX, lock the following accounts by placing a *LK* in encrypted password field in 


letc/shadow: adm, bin, daemon, listen, Ip, nobody, noaccess, nuucp, smtp, sys, uucp. These 
accounts should not have login shells, rather they should be set to /dev/null. 


UNCLASSIFIED 6 


508 / 570 


509 / 569 


UNCLASSIFIED 


Do Not Run Code From Non-Trusted Sources 


For the most part, software applications run in the security context of the person executing 
them without any consideration to source. А РКІ infrastructure may help, but when not 
available remember that spoofing the “From” line of an e-mail message and disguising URLs 
are trivial. DO NOT OPEN E-MAIL ATTACHMENTS OR RUN PROGRAMS UNLESS THE 
SOURCE AND INTENT ARE CONFIRMED AND TRUSTED. Always run Outlook so that it 
executes in the restricted zone and disable all scripting and active content for that zone. For 
more specific details, reference "E-mail Client Security in the Wake of Recent Malicious Code 
Incidents" available at http://www.nsa.gov. 


Block Certain E-Mail Attachment Types 


There are numerous kinds of executable file attachments that many organizations do not 
need to routinely distribute via e-mail. If possible, block these at the perimeter as а 
countermeasure against the malicious code threat. Organizations using Outlook can also 
block them using Outlook 2002 or, for earlier versions of Outlook, using the appropriate 
security patches. 


The specific file types that can be blocked are: 


„баз .hta .msp „п 
.bat inf .mst .vb 
.chm ins pif .vbe 
.cmd Asp ірі .vbs 
.com js гед .WS 
.cpl jse .scr .WSC 
crt Ink „вс! .wsf 
.exe .msi .shs .wsh 


It may be prudent to add, or delete files from this list depending upon operational realities. 
For example, it may be practical to block applications within the Microsoft Office family, all of 
which can contain an executable component. Most notable are Microsoft Access files, which 
unlike other members of the Office family have no intrinsic protection against malicious 
macros. 


Follow The Concept Of Least Privilege 


Least privilege is a basic tenet of computer security that means users should be given only 
those rights required to do their job. Malicious code runs in the security context of the user 
launching the code. The more privileges the user has, the more damage the code can do. 
Recommendations pertaining to the least privilege principle include: 


о Keep the number of administrative accounts to a minimum 


а Administrators should use a regular account as much as possible instead of logging 
in as administrator or root to perform routine activities such as reading mail 


о Set resource permissions properly. Tighten the permissions on tools that an attacker 
might use once he has gained a foothold on the system, e.g., explorer.exe, 
regedit.exe, poledit.exe, taskman.exe, at.exe, cacls.exe, 
cmd.exe, finger.exe, ftp.exe, nbstat.exe, net.exe, netl.exe, 
netsh.exe, гср.ехе,  regedt32.exe,  regini.exe, regsvr32.exe, 
rexec.exe, rsh.exe, runas.exe, runonce.exe, svrmgr.exe, 
sysedit.exe,  telnet.exe, tftp.exe, tracert.exe, usrmgr.exe, 


UNCLASSIFIED 7 


509 / 570 


510 / 569 


UNCLASSIFIED 


wscript.exe, and xcopy.exe. Unix tools or utilities that should be restricted are 
debuggers, compilers, and scripting languages such as gcc, регі, etc. 


Q The least privilege concept also applies to server applications. Where possible, run 
services and applications under a non-privileged account. 


Application Auditing 


Most server-level applications have extensive auditing capabilities. Auditing can be of value 
in tracking down suspected or actual intrusions. Enable auditing for server applications and 
audit access to key files (such as those listed above) that an attacker might use once he has 
gained a foothold on a compromised server. 


Network Printer 


Today's network printers contain built-in FTP, WEB, and Telnet services as part of their OS. 
Enabled network printers can be readily exploited and are often overlooked by system 
administrators as a security threat. These network printers can and are often exploited as 
FTP bound servers, Telnet jump-off platforms, or exploited by web management services. 
Change the default password to a complex password. Explicitly block the printer ports at the 
boundary router/firewall and disable these services if not needed. 


Simple Network Management Protocol (SNMP) 


SNMP is widely used by network administrators to monitor and administer all types of 
computers (e.g., routers, switches, printers). SNMP uses an unencrypted "community string" 
as its only authentication mechanism. Attackers can use this vulnerability in SNMP to 
possibly gather information from, reconfigure or shut down a computer remotely. If an attack 
can collect SNMP traffic on a network, then he can learn a great deal about the structure of 
the network as well as the systems and devices attached to it. 


Disable all SNMP servers on any computer where it is not necessary. However, if SNMP is a 
requirement, then consider the following. Allow read-only access and not read-write access 
via SNMP. Do not use standard community strings (e.g., public, private). If possible, only 
allow a small set of computers access to the SNMP server on the computer. 


Network Security Testing 


Test regularly the security of all of the following computers on the network: clients, servers, 
switches, routers, firewalls and intrusion detection systems. Also, do this after any major 
configuration changes on the network. 


UNCLASSIFIED 8 


510 / 570 


511 / 569 


UNCLASSIFIED 


Perimeter Routers and Firewalls 


The following section addresses recommendations for securing network perimeter routers 
and firewalls. 


Host Security 


Recommendations for improved host security include: 


а 


Shut down unneeded TCP/UDP servers (e.g., bootps, finger) on the router ог the 
firewall. Servers that are not running cannot break. Also, more memory апа 
processor slots are available with less servers running. 


For TCP/UDP servers on the router or the firewall that are necessary, make sure that 
access to them is limited only to the administrators. 


Shut down unneeded services (e.g., source routing, remote configuration) on the 
router or the firewall. 


Disable any unused interface on the router or the firewall. Protect each and every 
active interface on the router or the firewall from information gathering and attacks. 


Protect each and every management port on the router or the firewall from attacks. 
Disable any unused management port. 


Configure durable passwords on the router or the firewall. For each password use 
the following guidelines: be at least eight characters long, not be words, not begin 
with a number, and include at least one character from the sets of letters, numbers 
and all other characters (e.g. ,/«»;"[M)-!(QZ$96^&*() +`-= ). Consider using 
different passwords for each router and each firewall. Change passwords at least 
once every 90 days. 


Example: Cisco IOS Routers 


The following scenario steps through the recommendations listed above. 


The show processes command can help to show active information about the servers on 
the router. The following commands show how to disable the following servers: 
TCP/UDP small servers (echo, discard, daytime, chargen), bootps, finger, http, identd 
and snmp. 


Router(config)f no service tcp-small-servers 


Router (config)# no service udp-small-servers 


Router (config)# no ip bootp server 


Router (соп 194) # no service finger 


Router (соп 19) # no ip http server 


Router (соп 19) # no ір identd 


Router (config) # no snmp-server community «community string» 


If SNMP on the router is required, use the following commands to clear out any SNMP 
servers with default community strings. 


Router (соп 194) # no snmp-server community public 


UNCLASSIFIED 9 


511/570 


512 / 569 


UNCLASSIFIED 


Router (config) # no snmp-server community private 


Then set up the SNMP server with a community string that is difficult to guess. Also, if 
possible, allow only read-only access to the server; do not allow read-write access to the 
server. Apply an access-list to the server. Refer to the following section on TCP/IP 
Filters for discussion of an access-list for SNMP in more detail. The following command 
is an example. 


Router (config) # snmp-server community S3cr3t-strin9 ro 10 


The following commands disable the following services: Cisco Discovery Protocol (CDP), 
remote configuration downloading, source routing and zero subnet. 

Router (соп 19) # по cdp run 

Router (соп 194) # no service config 

Router (config) # по ip source-route 


Router (соп 19) # по ip subnet-zero 


The following command disables a router interface. 


Router (config-if)# shutdown 


Secure each and every active interface on the router from Smurf attacks, ad-hoc routing 
and access-list queries with the following commands. 


Router (config-if)# no ip directed-broadcast 
Router (config-if)# no ip proxy-arp 


Router (config-if)# no ip unreachables 


Configure the console line () and the virtual terminal lines () on the router to time out a 
session, to require a password at login and to allow only telnet traffic. If the auxiliary line 
() is not needed, then it should be disabled. Use the following line configuration 
commands to configure the lines. 

Router (config) # line con 0 

Router (config-line)# exec-timeout 5 0 

Router (config-line) # login 

Router (config-line)# transport input telnet 

Router (соп 194) # line aux 0 

Router (config-line)# no exec 

Router (config-line) # exec-timeout 0 5 


Router (config-line) # no login 


Router (config-line)# transport input none 


Router (соп 19) # line vty 0 4 


UNCLASSIFIED 10 


512 / 570 


513 / 569 


UNCLASSIFIED 


Router (config-line)# exec-timeout 5 0 
Router (config-line) # login 


Router (config-line)# transport input telnet 


Configure the Enable Secret password, which is protected with an MD5-based algorithm. 
The following global configuration command is an example. 
Router (соп 19) # enable secret 0 2manyRt3s 


Configure passwords for the console line, the auxiliary line and the virtual terminal lines. 
Use a different password for the console line and the auxiliary line versus the virtual 
terminal lines. The following line configuration commands are examples. 


Router (config) # line con 0 
Router (config-line)# password Soda-4-jimmY 
Router (соп 194) # line aux 0 


Router (config-line)# password Popcorn-4-sara 


Router (соп 19) # line vty 0 4 


Router (config-line)# password Dots-4-georg3 


Provide a basic protection for the line passwords by using the following global 
configuration command. 


Router (config)# service password-encryption 


TCP/IP Filters 


Carefully consider which TCP/IP services will be allowed through and to the perimeter routers 
and firewalls (inbound and outbound). Use the following guidelines for creating filters: those 
services that are not explicitly permitted are prohibited. The following tables present common 
services to restrict because they can be used to gather information about the protected 
network or they have weaknesses that can be exploited against the protected network. 


Table 1 lists those TCP or UDP servers that should be completely blocked at the 
perimeter router or firewall. These services should not be allowed across the router or 
the firewall in either direction. Also, they should not be allowed to the router or the 
firewall. 


Table 2 lists those TCP or UDP servers on the protected network, on the router or on the 
firewall that should not be accessible by external clients. 


Table 3 lists the common TCP or UDP servers on the protected network, on the router or 
on the firewall that may need some access by internal or external clients and servers. 
Many of these services can be filtered to the few authorized computers (e.g., ftp server, 
mail server, domain name server, web server) on the protected network or on the DMZ 
subnet. 


Table 4 lists the ICMP message types that can be allowed outbound from the protected 
network, while all other message types should be blocked. 


UNCLASSIFIED 11 


513 / 570 


UNCLASSIFIED 


m Table 5 lists the ICMP message types that can be allowed inbound to the protected 
network, while all other message types should be blocked. 


In general, the administrator should create filters focusing on what services and hosts are 
permitted and denying everything else. This method means that one may not need to block 
each service in the tables below with a specific filter statement. Finally, use an intrusion 
detection system on the protected network to monitor the TCP/IP traffic that is allowed past 
the perimeter routers and firewalls. 


UNCLASSIFIED 12 


514 / 569 514 / 570 


515 / 569 


UNCLASSIFIED 


Table 1: 
TCP or UDP Servers to Completely Block at the Perimeter Router/Firewall 


Port(s) (Transport) Server Port(s) (Transport) Server 
1 (TCP & UDP) tcpmux 1981 (TCP) Shockrave 
7 (TCP & UDP) echo 1999 (TCP) BackDoor 
9 (TCP & UDP) discard 2001 (TCP) Trojan Cow 
11 (TCP & UDP) systat 2023 (TCP) Ripper 
13 (TCP & UDP) daytime 2049 (TCP & UDP) nfs 
15 (TCP & UDP) netstat 2115 (TCP) Bugs 
17 (TCP & UDP) qotd 2140 (TCP) Deep Throat 
19 (TCP & UDP) chargen 2222 (ТСР) Subseven21 
37 (TCP & UDP) time 2301 (TCP & UDP) compaqdiag 
43 (TCP & UDP) whois 2565 (TCP) Striker 
67 (TCP & UDP) bootps 2583 (TCP) WinCrash 
68 (TCP & UDP) bootpc 2701 (TCP & UDP) sms-rcinfo 
69 (UDP) tftp 2702 (TCP & UDP) sms-remctrl 
93 (ТСР) supdup 2703 (TCP & UDP) sms-chat 
111 (TCP & UDP) sunrpc 2704 (TCP & UDP) sms-xfer 
135 (TCP & UDP) loc-srv 2801 (ТСР) Phineas P. 
137 (TCP & UDP) netbios-ns 4045 (UDP) lockd 
138 (TCP & UDP) netbios-dgm 5800 - 5899 (ТСР) winvnc web 
server 
139 (TCP & UDP) netbios-ssn 5900 - 5999 (ТСР) winvnc 
177 (TCP & UDP) xdmcp 6000 - 6063 (ТСР) X11 Window 
System 
445 (TCP & UDP) microsoft-ds 6665 - 6669 (TCP) irc 
512 (TCP) rexec 6711 - 6712 (ТСР) Subseven 
513 (TCP) rlogin 6776 (TCP) Subseven 
513 (UDP) who 7000 (TCP) Subseven21 
514 (TCP) rsh, rcp, 12345 - 12346 NetBus 
rdist, rdump, (TCP) 
rrestore 
515 (TCP) lpr 16660 (ТСР) Stacheldraht 
517 (UDP) talk 27444 (UDP) Trinoo 
518 (UDP) ntalk 27665 (TCP) Trinoo 
540 (ТСР) uucp 31335 (UDP) Trinoo 
1024 (TCP) NetSpy 31337 - 31338 (TCP Back Orifice 
& UDP) 
1045 (TCP) Rasmin 32700 - 32900 (TCP RPC services 
& UDP) 
1090 (TCP) Xtreme 33270 (TCP) Trinity V3 
1170 (ТСР) Psyber S.S. 39168 (ТСР) Trinity V3 
1234 (TCP) Ultors Trojan 65000 (ТСР) Stacheldraht 
1243 (TCP) Backdoor-G 
1245 (TCP) VooDoo Doll 
1349 (UDP) Back Orifice 
DLL 
1492 (TCP) FTP99CMP 
1600 (TCP) Shivka-Burka 
1761 - 1764 (ТСР sms-helpdesk 
& UDP) 
1807 (TCP) SpySender 
UNCLASSIFIED 


13 


515 / 570 


516 / 569 


UNCLASSIFIED 


Table 2: 


TCP or UDP Servers to Block at the Perimeter Router/Firewall from External Clients 


TCP or UDP Servers to Allow Limited Access at the Perimeter Router/Firewall 


Port(s) (Transport) Server 
79 (TCP) finger 
161 (TCP & UDP) snmp 
162 (TCP & UDP) snmp trap 
514 (UDP) syslog 
550 (TCP & UDP) new who 
Table 3: 


Port(s) (Transport) Server 
20 (ТСР) ftpdata 
21 (TCP) ftp 
22 (TCP) ssh 
23 (ТСР) telnet 
25 (TCP) smtp 
53 (TCP & UDP) domain 
80 (TCP) http 
110 (ТСР) pop3 
119 (TCP) nntp 
123 (TCP) ntp 
143 (TCP) imap 
179 (TCP) bgp 
389 (TCP & UDP) ldap 
443 (TCP) ssl 
1080 (TCP) socks 
3128 (TCP) squid 
8000 (TCP) http (alternate) 
8080 (ТСР) http-alt 
8888 (TCP) http (alternate) 


Table 4: 
ICMP Message Types to Allow Outbound at the Perimeter Router/Firewall 
Message Types 
Number Name 
4 Source quench 
8 echo request (ping) 
12 parameter problem 


ICMP Message Types to Allow Inbound at the Perimeter Router/Firewall 


Table 5: 


Message Types 
Number Name 
0 echo reply 
3 destination unreachable 
4 Source quench 
11 time exceeded 
12 parameter problem 


UNCLASSIFIED 


14 


516 / 570 


517 / 569 


UNCLASSIFIED 


This section describes methods using filters to defend the router, the firewall and the 
protected network from information gathering and attacks. Note that one needs to be careful 
with combining the below recommendations together in any filter in order to prevent 
contradictions or other problems. 


When creating a TCP/IP filter always delete any previous filter. 


Set logging for each statement in the filter that blocks access. This feature will 
provide valuable information about what types of packets are being denied and can 
be used in intrusion detection against one's network. Refer to the following section 
on Logging and Debugging for discussion of logging configuration in more detail. 


Q Provide IP address spoof protection for the protected network. For inbound traffic do 
not allow any IP packet that contains an IP address in the source IP address field 
from the following: the protected network, any local host address (127.0.0.0 — 
127.255.255.255), any reserved address (10.0.0.0 — 10.255.255.255, 172.16.0.0 - 
172.31.255.255, 192.168.0.0 - 192.168.255.255) or any multicast address 
(224.0.0.0 — 239.255.255.255). For outbound traffic allow IP traffic from the 
protected network and do not allow IP traffic that contains an external IP address in 
the source IP address field. 


а Protect the router or the firewall from the Land Attack. This attack involves sending a 
packet to the router with the same IP address in the source address and destination 
address fields and with the same port number in the source port and destination port 
fields. This attack can cause a denial of service. 


а Protect the router or the firewall from the TCP SYN Attack. The TCP SYN Attack 
involves transmitting a volume of connections that cannot be completed at the 
destination. This attack causes the connection queues on the router or the firewall to 
fill up, thereby denying service to legitimate TCP traffic. 


о Protect the router, the firewall or the protected network from unnecessary ICMP 
traffic. There are a variety of ICMP message types, and some are associated with 
programs. Some message types are used for network management and are 
automatically generated and interpreted by network devices. For example, the ping 
program works with message type Echo. With Echo packets an attacker can create 
a map of the protected networks behind the router or the firewall. Also, he can 
perform a denial of service attack by flooding the router, the firewall or the hosts on 
the protected network with Echo packets. With Redirect packets the attacker can 
cause changes to a host’s routing tables. 


For outbound ICMP traffic, one should allow the message types Echo, Parameter 
Problem and Source Quench. Otherwise, block all other ICMP message types going 
outbound. With Echo packets users will be able to ping external hosts. Parameter 
Problem packets and Source Quench packets improve connections by informing 
about problems with packet headers and by slowing down traffic when it is 
necessary. For inbound ICMP traffic, one should allow the following message types: 
Echo Reply, Destination Unreachable, Source Quench, Time Exceeded and 
Parameter Problem. Otherwise, block all other ICMP message types coming 
inbound. 


а Protect the router, the firewall or the protected network from inbound traceroute. 
Traceroute is a utility that prints the IP addresses of the routers that handle a packet 
as the packet hops along the network from source to destination. On Unix operating 
systems traceroute uses UDP packets and causes routers along the path to generate 
ICMP message types Time Exceeded and Unreachable. Similar to ICMP Echo 


UNCLASSIFIED 15 


517 / 570 


518 / 569 


UNCLASSIFIED 


packets, an attacker can use traceroute to create a map of the protected network 
behind the router or the firewall. 


а Apply a filter to the router or the firewall to allow only a small set of computers (e.g., 
those used by the administrators) Telnet access to the router or the firewall. Log all 
successful and unsuccessful connections. 


а ІҒап SNMP server is necessary on the router or the firewall, then apply a filter to the 
router or the firewall to allow only a small set of computers (e.g., those used by the 
administrators) SNMP access to the router or the firewall. Log all successful and 
unsuccessful connections. 


Example: Cisco 105 Routers 
The following scenario steps through the recommendations listed above. 


The following commands show an example of how to clear out a previous version of an 
access-list before creating a new access-list. 

Router (config)# no access-list 100 

Router (config)# access-list 100 permit ip 10.2.9.0 0.0.0.255 any 


Router (соп 19) # access-list 100 permit ip 10.55.1.0 0.0.0.255 any 


The following commands show an example of how to set logging on an extended IP 
access-list statement. 

Router (config)# access-list 102 permit tcp 10.4.6.0 0.0.0.255 any eq 80 
Router (config)# access-list 102 deny ip any any log 


Note that there is an implicit deny statement at the end of every access list on a Cisco 
router. This implicit statement blocks all other packets not permitted by the rest of the 
access-list. However, it does not log these packets. Thus, add the following statements 
at the end of each extended IP access-list. These statements will guarantee that the 
router will log the values for the source and destination ports for TCP and UDP traffic 
being denied. 


Router (config)# access-list 106 deny udp any range 0 65535 any range 0 
65535 log 


Router (config)# access-list 106 deny tcp any range 0 65535 any range 0 
65535 log 


Router (соп 19) # access-list 106 deny ip any any log 


Below are two example access-lists that provide IP address spoof protection. The first 
example is for inbound traffic to the protected network (e.g., 14.211.150.0). 

Router(config)# access-list 100 deny ір 14.211.150.0 0.0.0.255 any log 

Router(config)# access-list 100 deny ip 127.0.0.0 0.255.255.255 any log 

Router(config)# access-list 100 deny ір 10.0.0.0 0.255.255.255 any log 

Router(config)# access-list 100 deny ip 172.16.0.0 0.15.255.255 any log 

Router(config)# access-list 100 deny ip 192.168.0.0 0.0.255.255 any log 


UNCLASSIFIED 16 


518 / 570 


UNCLASSIFIED 


Router(config)# access-list 100 deny ip 224.0.0.0 15.255.255.255 any log 
Router(config)# access-list 100 permit ip апу 14.211.150.0 0.0.0.255 
Кошецсог а) # interface Ethernet1/2 

Router(config-if}# description "external interface" 

Router(config-if)}# ip address 25.73.1.250 255.255.255.248 
Router(config-if}# ip access-group 100 in 


The second example is for outbound traffic from the protected network (e.g., 
14.211.150.0). 


Router(config)# access-list 102 permit ip 14.211.150.0 0.0.0.255 апу 
Router(config)# access-list 102 deny ір any any log 
Router(config)# interface Ethernet0/1 

Router(config-if)£ description "internal interface" 

Router(config-if)£ ip address 14.211.150.17 255.255.255.240 
Router(config-if)}# ip access-group 102 in 


Note that you can apply two access-lists to any interface on the router, one for network 
traffic leaving the interface and the other for network traffic entering the interface. 


m Тһе following commands show how to protect the router from the Land Attack. 


Router(config)# access-list 101 deny ip host 198.26.171.178 host 198.26.171.178 log 
Router(config)# access-list 101 permit ip any any 

Router(config)# interface serial2/1 

Router(config-if)£ description "external interface" 

Router(config-if)}# ip address 198.26.171.178 255.255.255.248 


Router(config-if)}# ip access-group 101 in 


m Protect the router against the TCP SYN Attack for the following two scenarios: blocking 
external access and limited external access. Below is an example for blocking external 
access on a Cisco router. The access list blocks packets from any external network that 
have only the SYN flag set. Thus, it allows traffic from TCP connections that were 
established from the protected network (e.g., 14.2.6.0), and it denies anyone coming from 
any external network from starting any TCP connection. 

Router(config)# access-list 100 permit tcp any 14.2.6.0 0.0.0.255 established 
Router(config)# access-list 100 deny ip any any log 
Router(config)# interface serial0/0 


Router(config-if}# description "external interface" 


Router(config-if}# ip access-group 100 in 


UNCLASSIFIED 17 


519 / 569 519 / 570 


520 / 569 


UNCLASSIFIED 


Below is an example for allowing limited external access on a Cisco router. Using the 
TCP intercept feature, the access list blocks packets from unreachable hosts; thus, it only 
allows reachable external hosts to initiate connections to a host on the protected network 
(e.g., 14.2.6.0). |n intercept mode the router intercepts a TCP connection and 
determines if a host is reachable. If successful, the router establishes the connection; 
otherwise, it prevents the connection. This protection does not stop reachable hosts from 
performing this attack against the router or the protected networks. 


Router (config)# ip tcp intercept list 100 

Router (config) # access-list 100 permit tcp any 14.2.6.0 0.0.0.255 
Router (соп 19) # access-list 100 deny ip any any log 

Router (config)# interface е0/0 

Router (config-if)# description "external interface" 


Router (config-if)# ip access-group 100 in 


The following commands show how to allow outbound from the protected network (e.g., 
14.2.6.0) only the following ICMP message types: Echo, Parameter Problem and Source 
Quench. 

Router(config)# access-list 102 permit icmp 14.2.6.0 0.0.0.255 any echo 


Router(config)# access-list 102 permit icmp 14.2.6.0 0.0.0.255 any parameter- 
problem 


Router(config)}# access-list 102 permit icmp 14.2.6.0 0.0.0.255 any source- 
quench 


Router(config)# access-list 102 deny icmp any any log 


The following commands show how to allow inbound to the protected network (e.g., 
14.2.6.0) only the following ICMP message types: Echo Reply, Destination Unreachable, 
Source Quench, Time Exceeded and Parameter Problem. 


Router(config)# access-list 100 permit icmp any 14.2.6.0 0.0.0.255 echo-reply 


Router(configf£ access-list 100 permit icmp апу  14.2.6.0 0.0.0.255 
unreachable 


Router(config)}# access-list 100 permit icmp any 14.2.6.0 0.0.0.255 source- 
quench 


Router(config)# access-list 100 permit icmp any 14.2.6.0 0.0.0.255 time- 
exceeded 


Router(config)# access-list 100 permit icmp any 14.2.6.0 0.0.0.255 parameter- 
problem 


Router(config)# access-list 100 deny icmp any any log 


The following command shows how to block inbound traceroute from a Unix computer. 


Router (config)# access-list 111 deny udp any any range 33434 33534 log 


UNCLASSIFIED 18 


520 / 570 


521 / 569 


UNCLASSIFIED 


m Тһе following commands show how to allow Telnet access from certain computers on the 
protected network (e.g., 14.4.4.0) to the router via an extended IP access-list. The 
administrator can telnet to any interface IP address on the router. However, the router 
converts any interface IP address to 0.0.0.0. Thus, the unusual destination IP address 
0.0.0.0 must be used in the access-list. 


Router(config)# access-list 105 permit tcp host 14.4.4.10 host 0.0.0.0 eq 23 log 


Router(config)# access-list 105 permit tcp host 14.4.4.11 host 0.0.0.0 eq 23 log 


Router(config)# access-list 105 permit tcp host 14.4.4.12 host 0.0.0.0 eq 23 log 


Router(config)# access-list 105 deny ip any any log 


Router(config) line vty 04 


Router(config-line)# access-class 105 in 


m Тһе following commands show how to allow SNMP access from certain computers on the 
protected network (e.g., 14.4.4.0) to the router via a standard IP access-list. 


Router(config)# access-list 10 permit 140.4.4.10 


Router(config)# access-list 10 permit 140.4.4.11 


Router(config)# access-list 10 permit 140.4.4.12 


Router(config)# snmp-server community snmp72str1ng64 ro 10 


Logging and Debugging 


Logging on a router or a firewall offers several benefits. It informs the administrator if the 
router or the firewall is working properly or has been compromised. It can also show what 
types of attacks are being attempted against the router, the firewall or the protected network. 


The following are recommendations for logging and debugging: 


а 


а 


Send Ше most serious level of logs to the console on the router or the firewall in 
order to alert the administrator. 


Send the logs to a log host, which should be a dedicated computer on the protected 
network whose only job is to receive logs. The log host should have all unnecessary 
servers and accounts disabled except for syslog. 


Configure the router or the firewall to include more specific time information in the 
logging and in the debugging. Direct the router or the firewall to at least two different, 
reliable network time protocol (NTP) servers to ensure accuracy and availability of 
time information. Set all NTP messages with the same IP source address of an 
interface on the internal network. This configuration will allow the administrator to 
create a TCP/IP filter that allows time information only from the internal IP address of 
the router or the firewall to the external NTP servers. This filter will help to prevent 
spoofing or flooding NTP messages to the router or the firewall. Include a more 
specific timestamp in each log message and each debug message. This will allow an 
administrator to trace network attacks more credibly. 


UNCLASSIFIED 19 


521 / 570 


522 / 569 


UNCLASSIFIED 


о By default, a log message contains the IP address of the interface it uses to leave the 
router or the firewall. Instead, set all log messages with the same IP source address 
of an interface on the internal network, regardless of which interface the messages 
use. This configuration will allow the administrator to create a TCP/IP filter that 
allows logs only from the internal IP address of the router or the firewall to the logging 
host. This filter will help to prevent spoofing or flooding log messages to the logging 
host. 


а Finally, consider also sending the logs to a dedicated printer to deal with worst-case 
scenarios, e.g., failure of the log host. 


Example: Cisco IOS Routers 
The following scenario steps through the recommendations listed above. 


Enable the router's logging capability with the following command. 


Router (config) # logging on 


Set the syslog level to be sent to the router console. The following command is ап 
example. 


Router (config) # logging console informational 


Note that the effect of the log keyword with the IP extended access-list statements 
depends on the setting of the logging console command. The 1og keyword takes effect 
only if the logging console syslog level is set to 6 (informational) ОГ 7 (debugging). If 
the level is changed to a value less than 6 and if the 16g keyword is used within an IP 
extended access-list command, then no information is logged to the log host or displayed 
to the console. Refer to the previous section on TCP/IP Filters for discussion of access- 
lists in more detail. Finally, disable logging to all terminal lines except for the router 
console with the following command. 


Router(config)# no logging monitor 


Set the IP address of the log host. Set the syslog level to be sent to the log host. Set 
the syslog facility type in which log messages are sent. The following commands are 
examples. 

Router (config) # logging 10.1.1.200 

Router (config) # logging trap debugging 


Router (config) # logging facility local? 


The following commands show an example of how to зе time information for the logging 
and for the debugging. 

Router (config)# пір server 192.168.41.40 

Router (config)# пер server 192.168.41.41 


Router (config)# ntp source Ethernet0/1 


UNCLASSIFIED 20 


522/570 


UNCLASSIFIED 


Router (config)# service timestamps log datetime localtime show-timezone 
Router (config)# service timestamps debug datetime localtime show-timezone 
Router (config) # clock timezone EST -5 


Router (config) # clock summer-time EDT recurring 


m Тһе following command shows an example of how to set all log messages with the same 
IP source address of a router interface. 


Router (config) # logging source-interface е0/1 


General Recommendations 


It is highly recommended that the configuration files for the router or the firewall be created, 
stored and maintained on a computer offline in ASCII format. These files will contain any 
comments that can help give perspective to the configuration settings and the filters. Also, 
changes to the filters can be done with much more ease and accuracy. Then the file can be 
transferred from the computer to the router or the firewall. This is invaluable for diagnosing 
suspected attacks and recovering from them. Finally, protect the contents of the 
configuration files from unauthorized individuals. 


UNCLASSIFIED 21 


523 / 569 523 / 570 


524 / 569 


UNCLASSIFIED 


Windows NT 4.0 and Windows 2000 


Service Packs And Hotfixes 


A service pack is a periodic update to the operating system that contains fixes to 
vulnerabilities and bugs. To date, Microsoft has released six service packs for Windows NT 
4.0 and two service packs for Windows 2000. Updates addressing specific vulnerabilities and 
bugs introduced between Service Packs are called hotfixes. Service packs are cumulative, 
meaning they include all hotfixes from previous service packs, as well as new fixes. 


In addition to installing the latest service packs, it is important to install new hotfixes, as these 
patches will often address current attacks that are proliferating throughout networks. Although 
Microsoft recommends applying a hotfix only if a system experiences the specific problem, it 
is recommended that all security-related hotfixes be installed immediately after installation of 
the latest service pack. If a service pack is reapplied at any time, the hotfixes must also be 
re-installed. 


Checking System Patch Status 
A major challenge for network administrators is keeping up to date on the latest patches. 
Microsoft now provides a Network Security Hotfix Checker (Hfnetchk.exe) tool that lets 
administrators scan their servers -- including remote ones -- to ensure that that they are up to 
date on all security patches for Windows NT 4.0, Windows 2000, IIS 4.0, IIS 5.0, IE and SQL 
Server. Detailed information on Hfnetchk, including download location, is available in 
Knowledge Base article Q303215 at 


http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/tools/hfnetchk.asp. 


Windows NT 4.0 Patches 


To achieve the highest level of Windows NT security, install Service Pack 6a and the post 
Service Pack 6a hotfixes. For a complete list of available service packs and hotfixes go to 


http://Awww.microsoft.com/ntserver/nts/downloads/recommended/SP6/. 


Microsoft has provided the Security Rollup Package (SRP) as a mechanism for managing the 
rollout of security related fixes. The SRP includes the functionality from many security 
patches released for Windows NT 4.0 since the release of Service Pack 6a. The SRP 
includes post-Service Pack 6a fixes that were delivered via Microsoft security bulletins as well 
as a small number of fixes that were not addressed through this forum. For a complete listing 
of all fixes in the SRP, refer to Microsoft Knowledge Base Article (Q299444), “Post-Windows 
NT 4.0 Service Pack 6a Security Rollup Package (SRP),” at 


http://support.microsoft.com/support/kb/articles/q299/4/44.asp. 
Fixes not included in the SRP: 


Fixes for newer vulnerabilities may not be included in the SRP. These must be applied 
separately and may be downloaded from 


http://www.microsoft.com/ntserver/nts/downloads/recommended/SPG6/. Іп addition, the 
following vulnerability affecting Windows NT 4.0 systems is not included in the SRP. 


UNCLASSIFIED 22 


524 / 570 


525 / 569 


UNCLASSIFIED 


Enhanced Security Level Hotfix - When changing the domain password with the C2 
security registry entry enabled a "Stop Ox1E" error message may occur. The problem occurs 
if the administrator has Service Pack 6a (SP6a) installed and the following registry entry is 
set: 


Hive: HKEY LOCAL MACHINE 

Key: SYSTEM\CurrentControlSet\Control\Session Manager 
Value: | EnhancedSecurityLevel 

Туре: REG DWORD 

Data: 1 


This key ensures that Object Manager can change the attributes of a kernel object in the 
Object table for the current process if the previous mode of the caller is kernel mode. When 
attempting to change the password after setting this registry value, the following error 
message will be received: Stop 0x0000001e (0xc0000005, 0x8019bb12, 0x00000000, 
0x0000022c) 


A supported fix that corrects this problem is now available from Microsoft, but it is not 
available for public download. To resolve this problem immediately, contact Microsoft Product 
Support Services to obtain the fix. This hotfix is also available from NSA. For a complete list 
of Microsoft Product Support Services phone numbers and information on support costs, 
please go to the following address on the World Wide Web: 
http://support.microsoft.com/directory/overview.asp 


Windows 2000 Patches 


To achieve the highest level of Windows 2000 security, install Service Pack 2and the post 
Service Pack 2 hotfixes. For a complete list of available service packs and hotfixes, refer to 


http://www. microsoft.com/windows2000/downloads/default.asp 


List Of NT/Windows 2000 Security Measures 


This list of NT/Windows 2000 security measures is by no means exhaustive. There are 
approximately 400 known vulnerabilities with Windows NT/2000 and associated applications. 
This list addresses less than 10 percent of those vulnerabilities. It should also be understood 
that alleviating one's network of these vulnerabilities does not render the network "secure". 


Q Ensure that the file system is NTFS versus FAT. NTFS allows file access control to 
be set; FAT does not. 


Q Limit the information available from a null connection. Null connections (anonymous 
users) are included in the built-in Everyone security group; thus, anonymous users 
have access to any resources that the Everyone group has access to. Windows NT 
Service Pack 6a limits much of what an anonymous user can do. Prevent 
anonymous users from being able to enumerate account names and shares by 
setting the following registry key: 


Hive: HKEY LOCAL MACHINE 

Key: System\CurrentControlSet\Control\Lsa 
Name: RestrictAnonymous 

Type: REG_DWORD 

Value: 1 


а Remove the Everyone group from the “Access this Computer from the Network" user 
right. Replace it with the Authenticated Users group. In Windows NT 4.0, this can be 


UNCLASSIFIED 23 


525 / 570 


526 / 569 


UNCLASSIFIED 


accomplished under User Manager -» Policies -> User Rights. In Windows 2000, this 
can be done via the Security Configuration Toolset and Group Policy. 


Do not allow remote registry access. There are many registry keys that allow the 
Everyone group, and therefore anonymous users, read and/or set value permissions. 
If an unauthorized user was able to remotely edit the registry, he could modify 
registry keys in an attempt to gain elevated privileges. Restricting remote registry 
access is accomplished Бу setting security permissions оп the 
HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg key. It is 
highly recommended that only Administrators and System have remote access to the 
registry. 


Ensure that the Guest Account is disabled. Ensure that all accounts (service and 
user) have passwords regardless if the account is enabled or disabled. 


Disable LanMan authentication. LanMan passwords are used for backwards 
compatibility with older Windows operating systems (e.g., Windows 9x) and are 
simply the NT/2000 password converted to all uppercase and encrypted in a different 
way. LanMan passwords are easier to crack than NTLM hash because they are 
treated as two 7-character passwords. It is recommended that LanMan passwords 
be disabled. If Windows 9x boxes reside on the network, Directory Client Services 
(available on the Windows 2000 CD) must be installed on these systems in order to 
allow NTLM version 2 authentications. To disable LanMan authentication, set the 
following registry key: 


Hive: HKEY_LOCAL_MACHINE 

Key: System\CurrentControlSet\Control\Lsa 
Name: LMCompatibilityLevel 

Type: REG DWORD 

Value: 5 


Close ports 135, 137, 138, and 139 either at the premise router or firewall. For 
networks containing Windows 2000 systems, also block port 445. These ports are 
needed in an internal network, but not externally. Blocking these ports will stop many 
attacks against Windows NT and Windows 2000. Also, remove unneeded protocols 
(e.g. NetBeui, IPX). 


Out-of-the-box permissions on Windows NT system files and registry keys are overly 
permissive. Replace the Everyone group with the Authenticated Users group on 
critical system folders and files (e.g. WINNT, system32) and registry keys (e.g., 
HKLM\Software\Microsoft\Windows\Run and  HKLM\Software\Microsoft\Windows 
NT\CurrentVersion\AEDebug). 


Restrict permissions on network shares. When a share is created, the default access 
control is Everyone having Full Control. Restrict the share permissions to only those 
groups that need access. 


Remove all services that are not required (e.g., Telnet, FTP, Web). Ensure proper 
placement of services on the network (e.g. RAS or Web service should not be on a 
Domain Controller). 


Enable auditing. At a minimum, audit logons and logoffs, failed attempts at exercising 
user privileges, and system events such as shutdowns. 


Review Trust Relationships between domains. Remove unnecessary trusts. 


UNCLASSIFIED 24 


526 / 570 


527 / 569 


UNCLASSIFIED 


Microsoft Applications 


Vulnerabilities in applications such as Outlook, Microsoft Exchange, SQL Server, and ІІБ may 
open a network to attack. Therefore, it is important that applications be kept current with the 
latest patches and service packs. Microsoft provides several tools for improving application 
security. Some of these tools are listed below, along with a web reference to follow for more 
information. 


URL Scan Security Tool — Allows web server administrators to restrict servers to ensure 
that they only respond to legitimate requests. 
http://www.microsoft.com/technet/security/URLScan.asp 


IIS Lockdown Tool - A Microsoft tool for securing IIS 4.0 or 5.0 web server. 
http://www. microsoft.com/technet/security/tools/locktool.asp 


Improved Outlook E-mail Security Update - A new version of the Outlook E-mail Security 
Update is available that provides protection against additional types of e-mail-based attacks. 


http://office.microsoft.com/downloads/2000/Out2ksec.aspx 


HFNetChk Security Tool — In addition to operating system patches, checks security patches 
for IIS 4.0, IIS 5.0, IE, and SQL Server. 


http://www.microsoft.com/technet/security/tools/hfnetchk.asp 


Microsoft Personal Security Advisor - A Microsoft tool for checking that workstations are 
current with all security patches апа configured for secure operation. 


http://www. microsoft.com/technet/security/tools/mpsa.asp 


UNIX Networks 


The following recommendations can be taken to secure UNIX networks. 


Startup Scripts 


Check the permissions and ownership of files. If they allow world access, browse scripts to 
see if any unusual process or script is started, especially if in user directories. Files and 
directories should be owned by root/root or root/sys with limited or no world write or execute 
permissions so that they cannot be modified or exploited by unauthorized users. User startup 
files should be owned by the individual user and have permissions of 640. In each user's 
directory, check for hidden files (e.g.,. login, .profile, etc...) that have extensions, such 
as .old/. backup or begin with "..", "...". 


Services/Ports 


Run a port scanner, such as nmap (available at http://www.insecure.org/nmap) to list open 
ports and services. Many UNIX services have well known security vulnerabilities associated 
with them, which allow root access. All unnecessary services (e.g., rexd, rquotad, talk, 
sadmind, kcmsd, rstatd, fs, exec, daytime, walld, fingerd, systat, rusersd, sprayd, uucpd, 


UNCLASSIFIED 25 


527 / 570 


528 / 569 


UNCLASSIFIED 


chargen, time, echo, display, tftp, comsat and discard) should be disabled by placing a # at 
the beginning of the lines in the /etc/rc* files or in the /etc/inetd. conf file that caused 
the program to be executed. In addition, these ports should be blocked at the perimeter 
router or firewall. 


System Trust 


There are various ways for UNIX systems to allow access to a machine or an account without 
providing a password. Through the use of .rhosts ,.forward, .netrc, hosts.lpd, 
and hosts.equiv files, it is possible for a user on one system to access another system 
without providing a password. This practice should be reviewed for necessity. An intruder 
breaking into an authorized user's account can use those same trusts to reach multiple 
machines with little effort. Do not use plus signs (*) in these files as they allow wider access 
(to users and/or machines) than might be intended. Prohibit root from logging directly into a 
remote system through either the /etc/ttys, /etc/ttytab, ог /dev/default/login 
files. 


R Commands 


Telnet and the "r commands" (rlogin, rcp, rsh and rexec) may transmit the username and 
password in the clear making it easy for an attacker with a sniffer to capture this information 
and act as a trusted user. If trust relationships are set up, "r" commands enable someone to 
access a remote system without supplying a password. If an attacker gains control of any 
machine in a trusted network, then he or she can gain access to all other machines that trust 
the hacked machine. If these services are not required, they should be disabled; otherwise, 
install openssh (available at http://www.openssh.com/). In addition, ssh, which includes sftp, 
is an alternative solution to FTP. The service encrypts all traffic including the password to 
reduce the threat of eavesdropping. Do not allow trust relationships. 


Network Configurations 


Patches 


Check to see if network configuration files (such as hosts,  defaultdomain, 
defaultrouter, netmasks, etc.) are owned by root/root and have permissions of 644. 
This is suggested to alleviate unauthorized modifications. 


Ensure applicable system and security patches are current and have been installed. Note 
that patches may not be applied until a reboot occurs. Therefore, if a patch is listed in the 
output from "Patchdiag", "showrev", or whatever specific patch checker tool or UNIX 
command is used, but the machine has not been rebooted in awhile, there is a possibility that 
the machine may still be vulnerable. 


User Accounts 


Review all user accounts. Do they all have unique UIDs? This is important to enforce so that 
a person will not obtain the privileges associated with someone else's account or be able to 
read, delete, or modify another person's files. Check to make sure each shell field is set to a 
valid shell to alleviate malicious code from being executed and granting root access. The 
nobody4 account is for SunOS backward capability and should be deleted, if not needed. 
Make sure every line in the /etc/passwd file is in the proper format to alleviate accidental 
logins by an unauthorized person. Permissions for most home directories should be 740. Ftp 
and uucp users may be exceptions. Check automount directories for unauthorized 


UNCLASSIFIED 26 


528 / 570 


529 / 569 


UNCLASSIFIED 


automount maps. All maps should be protected with permissions 755 and owned by 
root/root. 


System administrators should not directly log in as root, but rather as themselves and then 
switch user (su) to root. This is important for accountability. An administrative group (e.g. 
wheel) should be created in the /etc/group file and each administrative user should belong 
to that group. Once the administrative group has been created, the "su" program should have 
its ownership, group, and permissions changed (root/wheel, 750). 


Permissions 


Look for 'setuid' or 'setgid' files and programs. Drop the 'suid' and/or 'sgid' bits, if not needed. 
Look for world writable directories and files and drop the world permissions, if not needed. 
This will help prevent unauthorized access or the insertion of malicious code. Also check for 
files owned by root and are mode world read/write. These files may indicate a potential 
symbolic link attack if one of the parent directories are writable by the attacker. Check umask 
values. Suggest that user umasks be set to 022. 


Cron/At Jobs 


Check permissions on cron and at job .a11ow and .deny files. They should be 644, 
root/sys. .a11ow files permit users to use crontab and atjobs. .deny restricts these users 
from access. If .allow files do not exist, then the system checks the .deny files. If neither file 
exists, depending on system configurations, it either allows just root or everyone to write 
cron/at jobs. Check to make sure that all cron and at jobs have valid users associated with 
them. Crontab and atjob files should be owned by the specific user associated with them and 
have permissions of 600. Make sure that all cron or at jobs use absolute paths (full path 
names). 


Core Dumps 


Check for core files. Most reside in the "/" directory, but others may be located elsewhere. 
Core files may contain sensitive system data or user passwords. Remove core files from the 
system. Configure the system so that when core files are created, they are automatically 
redirected to /dev/nu11 or have a ulimit=0. 


Network Services 


NIS 


Ensure NIS maps do not contain system accounts. Establish a securenets file in the NIS 
environment as an effective way to secure access. Look for strange entries within the NIS 
ypserv.log file. This is suggested to prohibit unauthorized access. 


NIS * 


Check to see if NIS + is running іп yp compatibility mode. If the "-YP" argument is there, the 
server is in NIS emulation mode and all exploits for NIS apply. Delete nobody permissions 
so that unauthorized persons don't have access to the NIS+ tables. Make sure world is given 
read-only permissions, except for the password table, which shouldn't allow any world 
access. When checking table permissions and access rights, they should match. Individual 
users should only have read access to the password table to prevent users from changing 
their UID value to 0, which would give them root access. 


UNCLASSIFIED 27 


529 / 570 


UNCLASSIFIED 


NFS 


Ensure the NFS environment is not exporting sensitive file systems to the world (i.e., /etc,...) 
regardless of permission settings. Ensure no critical file systems are shared to the world with 
read-write access. Ensure exported file systems are directed to specific hosts via the 
/etc/dfs/dfstab file or via netgroups. Ensure files аге not exported to "localhost". Ensure files 
are shared with the "nosuid" designator, unless suid is required. Ensure the anonymous user 
has been established correctly. If the system has anon=0, then "root" users of remote 
machines will have the UID specified after the "=" equal sign. If the "root=" user has been 
established, then root users of the machines specified after the "=" equal sign will have a UID 
of zero on the remotely mounted file systems. Check all clients and servers to see which file 
systems are being mounted locally or remotely. 


DNS 


The Domain Name Service is the mechanism that Internet hosts use to determine the IP 
address that corresponds to a given hostname. Attackers often attempt zone transfers in 
order to gather information about a local network. One way to prevent zone transfers is to 
block tcp port 53. This can be done via firewall or or router access filters. Disable the BIND 
name daemon (named) on systems not authorized to be DNS servers. On the servers, 
upgrade to the latest version of BIND and run it as a non-privileged user. Run DNS in a 
chrooted environment. Hide the version string via the version option in named.conf. 


Sendmail 


Upgrade to the latest version of Sendmail. Do not run Sendmail in daemon mode (turn off the 
-bd option) on machines that are not mail servers or relays. Do not display the version 
number through sendmail banners. Ensure that the decode alias is not available. Decode 
should be removed or commented out of the /etc/aliases file so that it does not pipe to 
the 'uudecode' command and allow an attacker to overwrite system files. Check for 
. forward files as they can open up the system to attacks. If not needed, remove them or 
link to /dev/null. If needed, permissions should be 740 and owned by the user. If the 
system is not a server or does not have to listen for incoming mail, rename the sendmail 
startup script, binaries, and configuration files and change their permissions to 000. 


System logging is crucial for troubleshooting and tracking unauthorized user accesses. 
Ideally, logs should be kept locally AND sent to a central loghost that does nothing but accept 
and store log messages. Your network security policy should help dictate which events need 
to be audited. Logcheck and swatch are tools that system administrators can use to examine 
log files for unusual activity, based on key phrases or specially set string patterns. They can 
also send emails to the system administrators, alerting them to possible unauthorized activity. 
Both are open source tools. 


X-Window Environments 
Remove the X Windowing environment on the server. By removing the Common Desktop 


Environment (CDE) and/or SUN's OPENWINDOW environment, the network server will not 
be susceptible to a variety of vulnerabilities. 


Distributed Server Functions 
It is commonly considered a good security practice to distribute the server functions of a 


network among separate systems. For instance, the DNS server should be separate from the 
mail server, which should be separate from the firewall, etc. A number of products, such as 


UNCLASSIFIED 28 


530 / 569 530 / 570 


UNCLASSIFIED 


Borderware's firewall product, include the software to run a web server, mail server, DNS 
server and other server functions all from the firewall. However, this presents a single point 
of failure for the network and therefore an avoidable vulnerability. Ideally, network servers 
should be set apart from the user segment in a secure DMZ or secure server network. Most 
firewalls allow this and if it does not, it can easily be accomplished by using routers behind 
the firewall. 


Chroot Environments 


chroot() is a UNIX command used to run a command or interactive shell with a special root 
directory. This command can also be used to create a "virtual" operating system and 
directory tree. It would be inside of the new "virtual" directory tree that DNS, Sendmail, Web, 
and other various servers could run. This would provide a potentially safe location for the 
applications. Building a chroot()ed environment can be very useful in protecting the rest of the 
system and keeping hackers out, however, it is easy to make a mistake while creating this 
chroot()ed environment. If it is improperly installed, it could create more ways for the hacker 
to infiltrate the machine. 


Interesting Files 


Check for files that have no permissions or have invalid owners or groups. Sometimes 
admins will have specific files which have no permissions assigned to them. These files can 
be kicked off by a script, cronjob, or app that temporarily changes the permissions during the 
execution of the program, then resets the program back to the original state. 


Peripheral Devices 


Consider removing or restricting access to local or network peripheral devices. Malicious 
code is easily introduced into secure networks via their peripheral devices. If an external 
device is not required for a specific client or server, have it removed. If the device cannot be 
removed, disable access to it via the hardware or software. Check to see if local and network 
printers are secure. Floppies should not be introduced to a client or server without the prior 
consent of the local Network Security Officer representative. 


Buffer Overflows 


Ensure that SOLARIS systems have a non-executable stack environment enabled. This will 
help prevent buffer overflows that originate from within the memory stack. For buffer 
overflows in RPC services, block the RPC port 111 at the router or firewall. 


System Utilities and Commands 


Restrict access or remove system utilities such as compilers, debuggers, etc. These utilities 
aid an adversary in informational reconnaissance. System commands like "strings" and "In" 
should either have their permission bits restricted or have them removed form the system. 


Current OS Packages 


Ensure that the system packages are current. Solaris 7 and 8 can check the integrity and 
accuracy of system packages. Sometimes malicious code can be introduced to a system as a 
system package. 


UNCLASSIFIED 29 


531 / 569 531/570 


532 / 569 


UNCLASSIFIED 


There are several scripts that can be implemented on a UNIX system that will search for 
rootkits on clients and servers. Checking the integrity of system files against a master backup 
known not to be altered by malicious code is also a good practice. 


Security Tools 


To ensure and maintain the integrity of the network servers, it is important to constantly 
monitor them for signs of malicious activity. There are a number of tools that can aid an 
administrator in this task. Two of these tools that are commonly implemented are Tripwire 
and TCPD. 


Tripwire 

Tripwire monitors the permissions and checksums of important system files to easily detect 
files that have been replaced, corrupted, or tampered. For example, if an intruder gains 
access to the server and replaces the /bin//Is command with one that performs unwanted 
functions, tripwire will send an alert. Tripwire will send the system administrator a report each 
night. Tripwire calculates the checksums of executable files from a clean install. It then 
recalculates these checksums and compares them on a regular basis. Since some hackers 
are skilled enough to spoof the checksums on modified files, tripwire uses two different 
checksum methods. It is important to save the original checksums оп a non-rewriteable CD 
on the system. This ensures data integrity. 


TCPD 


TCPD, also referred to as "TCP wrappers," allows one to log connections to TCP services 
such as telnet, rlogin and finger. |n addition, it allows one to restrict which systems can 
connect to these services via two files, hosts.allow and hosts.deny. Both of these features 
can be very useful when tracking or controlling unwanted guests on a network. TCPD is easy 
to install and does not require modification to existing network programs. Just modify tne 
/etc/inetd.conf file to execute TCPD instead of the actual program. TCPD will then do 
any necessary logging and security checks before running the real daemon. 


For example, if the /etc/inetd. conf originally contained this line: 


telnet stream tcp nowait root /etc/in.telnetd in.telnetd 


Change it to this: 


telnet stream tcp nowait root /usr/etc/tcpd in.telnetd 


UNCLASSIFIED 30 


532 / 570 


533 / 569 


UNCLASSIFIED 


UNIX Web Servers 


This section describes security configuration for UNIX web servers, using Apache as the 
example. It is assumed that Apache has been installed from the distribution and that none of 
the security parameters has been modified that come default in the original setup. 


General Guidance 


а Ensure that the computer that runs the web server is dedicated. It should not have 


other uses, e.g., being a client workstation or print server. Always upgrade to the 
latest version of the web server available that is not the beta version. 


Do not perform development work on the operational web server. All data should be 
in final form and simply copied into place. Create a secondary mirror of the server for 
all development services and experimentation. Transfer data to the web server by 
tape, disk, or CD. Do not use FTP or telnet for data transfer. 


Remove all unnecessary services on the web server, including FTP, telnet, and X 
Windows. |f that is not an option, make sure to run tcpwrappers on the open 
services. Use a port scanner to check for open ports on both the TCP and UDP 
protocols. If possible, use command line interfaces instead of X Windows. Using an 
X windowed interface opens up ports that cannot be effectively closed and still have 
the system remain functional. Since the server should be in production mode only, 
only a command line is required to update the site. Testing of the site should be 
done from a separate client. 


Isolate the web server physically and virtually. If possible allow local access to the 
web server to the fewest number of people with a minimal number of users. Keep 
the web server close to the administrator, the web engineer, or the webmaster. Keep 
the web server on a LAN segment separate from the rest of the IT infrastructure. Do 
not mount or share services to and from the server. 


Example: Apache 


As of 26 September 2001, Apache 1.3.20 is the latest version and is available at 
http://httpd.apache.org 


а Ensure the user running the Apache web server is set to nobody. In the httpd.conf 


file in the /usr/local/apache/conf directory, make sure that the effective user is 
nobody and that the group option is also set to nobody. Below are the lines to add to 
the file. 


User nobody 
Group nobody 


Ensure that user nobody does not own or have write access to the htdocs or cgi-bin 
subdirectories or any other subdirectory under these. Below are the commands to 
set ownership of these directories to root and to restrict write access to only root. 


chown -R root /usr/local/apache/htdocs 


UNCLASSIFIED 31 


533 / 570 


UNCLASSIFIED 


chown -R root /usr/local/apache/cgi-bin 
chmod 755 /usr/local/apache/htdocs 
chmod 755 /usr/local/apache/cgi-bin 


Do not store cgi-bin related data in a directory accessible to the web server. For 
example, create another directory called cgi-data in /usr/local/apache alongside cgi- 
bin and htdocs. Have the cgi scripts use that directory for data storage and 
manipulation. 


Turn off Autolndexing and Follow Symbolic Links. By default, Apache usually comes 
with automatic indexing of directories enabled. Look in the httpd.conf file (usually in 
the /usr/local/apache/conf directory) for the following line. 


«Directory "/usr/local/apache/htdocs"> 


Within those set of options you will see an Options line that may look like the 
following. 


Options Indexes FollowSymLinks Multiviews 


This configuration means any requests for a directory that do not find an index file will 
build an index of what is in the directory. Also, any symbolic link in the document 
directory will also be followed even if it is outside of the web server's purview. For 
example, a symbolic link may be made to the root directory, giving at least read 
access to a great deal of the system as the owner of the web server process. 


For the most secure/functional Directory options, this segment of the httpd.conf file 
should look like the following. 


«Directory "/usr/local/apache/htdocs"> 
Options Multiviews 

AllowOverride None 

Order allow,deny 

Allow from all 


</Directory> 


Refer to the following URLs for further guidance: 


534 / 569 


http://httpd.apache.org/docs/misc/security tips.html 
http://www.linuxplanet.com/linuxplanet/tutorials/1527/1/ 
http://www.modperl.com/perl conference/apache security/ 


http://www. bignosebird.com/apache/a11.shtml 


UNCLASSIFIED 32 


534 / 570 


535 / 569 


UNCLASSIFIED 


Intrusion Detection Systems (IDS) 


This section of the 60 Minute Network Security Guide departs from the explicit detail of 
previous sections and provides a brief overview of Intrusion Detection Systems, describing in 
general terms the steps to be taken when deploying IDS in your environment. 


Generally, there are two types of IDS: host based and network based. Host based IDS 
monitor security within a network component, such as a server or a workstation. Network 
based ID systems monitor the traffic between network components and networks. Some IDS 
are strictly network based, whereas others are a combination of network and host based. 


Most IDS are comprised of two components, sensors and managers. Depending on the IDS 
type, sensors can be either network based or host based. 


The following are steps to be taken when deploying an IDS. 


Step 1 - Identify what needs to be protected 


To maximize the utilization of IDS, the organization must first determine in order of priority 
what needs to be protected. For many organizations, the various servers, i.e., application, 
database, file and domain controllers, contain mission critical resources. Furthermore, 
depending on the organization, some departments may be more critical than others or must 
enforce different trust relationships. All of this must be defined in a priority list prior to 
deploying any IDS. 


Step 2 - Determine what types of sensors are required 


The types of sensors that are required are dependant on the priority list defined in Step 1. A 
host sensor would be used to monitor a critical server, whereas a network sensor would be 
used to monitor network entry points and critical network segments. 


Another important issue to consider is how many sensors the organization can afford to buy. 
This number will influence how the sensors are deployed throughout the network, as the 
number of critical resources must be balanced against how many sensors can be acquired 
and maintained. 


Step 3 - Configure host system securely 


Prior to loading any IDS, the host that the IDS will reside on must be configured securely. 
Often, the vendor of the IDS will supply its own host to run the IDS sensor, in which case, the 
vendor should supply guidelines on how to secure that host. Otherwise, the IDS typically 
reside on Unix and Microsoft Windows NT/2000 hosts. The guidelines for securing Unix and 
Microsoft Windows NT/2000 systems are well documented elsewhere in this document. 


Step 4 - Keep signature database current 


The majority of IDS that are currently available for use are signature based. Because new 
vulnerabilities and attacks are being discovered daily, the signature database must be kept 
current. The respective vendors should supply the latest signatures for their IDS. 


Step 5 - Deploy IDS sensors 


The final phase is to actually deploy the IDS. The following scenarios are based on how 
many sensors are available for deployment versus what is deemed critical. 


UNCLASSIFIED 33 


535 / 570 


536 / 569 


UNCLASSIFIED 


Scenario 1 


If the organization can only afford to purchase and monitor one sensor of any type, then it 
should be a network sensor. As described earlier, a network sensor is much better suited to 
monitoring large segments of a network, whereas a host sensor is limited to monitoring the 
system that it resides on. In this scenario, the ideal location to place the sole network sensor 
is in the DMZ, between the external router and the firewall, as shown in Figure 1. In spite of 
having only one sensor, this design allows the IDS to be used for maximum effectiveness. By 
placing the IDS sensor between the external router and the firewall, the sensor can monitor 
all network traffic going to and coming from the Internet. 


Furthermore, because the router can filter all incoming traffic from the Internet, the IDS 
sensor can be tuned to ignore certain types of attacks, thereby allowing the sensor to operate 
with maximum efficiency. 


~r 
RC 
Internet 
Web Network based 
Server ID sensor 
Figure 1 - Deploying 1 ID system 
Scenario 2 


In the case where only two sensors of any type can be acquired and maintained, then they 
should be network sensors. Like the previous scenario, one of the sensors should be placed 
in the DMZ, between the external router and the firewall. The second sensor should then be 
placed between firewall and the intranet, as shown in Figure 2. The second sensor can 
indicate what attack breached the firewall. By strategic placement of these two sensors, all 
access points from the Internet will be monitored. 


UNCLASSIFIED 34 


536 / 570 


537 / 569 


UNCLASSIFIED 


Network based 
ID sensor 


м” 
ме” ^ч. 
Internet 
ol 
sy E 
Web Network based 
Server ID sensor 
Figure 2 - Deploying 2 ID systems 
Scenario 3 


If more than two sensors of any type can be acquired and maintained, then at least two 
should be network sensors. Those sensors should be deployed as described in Scenario 2. If 
a critical LAN within the intranet needs to be protected, then a network sensor should be 
placed at the entry point to that LAN. The remaining sensors should be host sensors that are 
loaded onto critical servers, such as domain controllers, file servers, web servers, and mail 
servers. The order of what is deemed critical is determined by the organization, as directed in 
Step 1. 


Step 6 - Management and Configuration 


The other component of IDS, the manager, should be centrally located where dedicated 
security staff can monitor the health of the systems and network. Many organizations have a 
Network Operations Centers (NOC) that fulfills the role of a central location to place the 
manager. IDS sensors could then report all alerts to the NOC, thereby allowing the security 
staff to respond quickly to attacks and to notify the appropriate authorities, such as CERT 
technicians. 


The other issue to consider is how to configure the sensors. Careful configuration of the 
sensors can increase the effectiveness of IDS and all unnecessary signatures should be 
disabled. For example, if the network is entirely composed of Microsoft Windows NT systems, 
then the sensors can be configured to ignore any attacks that are directed against Unix 
systems. Therefore, if the organization has a priority list as defined in Step 1, as well as 
knowing the network intimately, it can benefit greatly from having a properly configured IDS. 


UNCLASSIFIED 35 


537 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


538 / 569 538 / 570 


(Swedish) "Men làs sjálv 4а fór fan." / Gustav Norstróm. 


(English) " Read this PDF text damn yourself, and then come back. * 
or "Fuck you, then read it yourself." 


" If you read something, and cant separera truth from fiction, when 
you read it, something important is missing уои. " / Gustav Norström. 


————99 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


555 / 569 555 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


540 / 569 540 / 570 


Report Criticizes C.I.A.'s Initial Handling of Havana Syndrome Cases... https://www.nytimes.com/2022/10/14/us/politics/cia-havana-syndrom... 


Ebe New York Cimes https://www.nytimes.com/2022/ 10/ 14/us/politics/cia-havana- 
syndrome-report.html 


Report Criticizes C.I.A.s Initial Handling of Havana 
Syndrome Cases 


Ап inspector general report sent to Congress this week finds fault with the intelligence 
agency's Office of Medical Services. 


3 By Julian E. Barnes 
< 


Oct. 14, 2022 


WASHINGTON — The C.I.A. sent an inspector general report that was critical of how 
the agency handled early reports of injuries that came to be known as Havana 
syndrome to Congress this week, according to current and former officials. 


The report, said people briefed on the findings, criticized how the Central Intelligence 
Agency's top physicians in the Office of Medical Services dealt with the unexplained 
incidents during the Trump administration, when some C.I.A. officials were doubtful 
about Havana syndrome-related illnesses. As a result, many people with symptoms 
found it difficult to get prompt medical care. 


Diplomats and C.I.A. officers began reporting ailments arising from strange incidents 
beginning in 2016 in Havana. Since then, government employees and family members 
in China, Austria, Serbia and other locations around the world have also reported 
symptoms. 


The report comes as the agency has begun making payments to some victims of what 
the government calls anomalous health incidents. Those victims have been frustrated 
with intelligence conclusions that the injuries were not the result of a worldwide 
campaign by a hostile country, such as Russia. 


C.I.A. officials declined to discuss details of the report, but a spokeswoman said the 
review covered 2016 to 2020 and acknowledged it had found weaknesses in the 
agency’s response. 


“The review found the challenge of simultaneously understanding and effectively 
responding to the myriad of challenges associated with anomalous health incidents 
complicated the agency’s response during this time period,” said Susan Miller, a 
spokeswoman for the C.I.A. 


The report, which went to lawmakers on Capitol Hill on Wednesday, is largely 


141.5589 10/15/2022222% M 


Report Criticizes C.I.A.'s Initial Handling of Havana Syndrome Cases... https://www.nytimes.com/2022/10/14/us/politics/cia-havana-syndrom... 


classified. Victims called on the government Friday to declassify the report, or at least 
its conclusions. 


“It is imperative the report be released to the public as victims deserve to know what 
actually occurred,” said Marc E. Polymeropoulos, a former C.I.A. officer who suffered 
Havana syndrome symptoms on a trip to Moscow in 2017. *The delay in health care 
that many suffered complicated their recovery.” 


The Office of Medical Services has long been criticized by C.I.A. officers who sought 
treatment for symptoms related to Havana syndrome. 


During the Trump administration, many officials were deeply skeptical of the Havana 
syndrome incidents, influenced by an F.B.I. document that concluded that many of 
them could be psychosomatic responses. A subsequent study by outside experts 
overseen by the National Security Council and the Office of the Director of National 
Intelligence has said in many cases the physical injuries to the brain cannot be 
explained by stress or other psychological illness. 


Soon after becoming C.I.A. director, William J. Burns removed the head of the Office of 
Medical Services, replacing him with a physician focused on patient care. 


Mr. Burns also made it easier for C.I.A. officers to see brain injury experts at the 
Walter Reed National Military Medical Center. In the statement, Ms. Miller 
emphasized that the C.I.A. has taken steps to improve the health care provided to 
officers who have reported Havana syndrome symptoms. 


“Аз we learn from the past and look to the future, we have expanded access to care and 
resources significantly over Ше past year and a half,” she said. 


Many experts who have studied brain scans of victims are convinced that at least some 
of the incidents were caused by directed energy or radio waves. 


But calls by the C.I.A., the State Department and the Pentagon early in the Biden 
administration for government officials to report possible incidents yielded hundreds 
of reports, most of which turned out to be explained by environmental causes or 
undiagnosed medical conditions. 


The C.I.A. has been investigating the incidents with a new team of officers since Mr. 
Burns took over. While some victims believe the incidents were caused by a foreign 
power, the C.I.A. investigators have not found any evidence to support that conclusion. 


Some individual incidents could have been the result of hostile action or a listening 
device turned into a weapon, but no single adversary appears to be responsible for the 
various incidents around the world, according to government officials. 


/ 


3420569 10/15/202222246 PN 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


543 / 569 543 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


545 / 569 545 / 570 


HA TREES escis 25-3 | 358.570 


USA - NEVADA - AREA 5 


w q mm ` A23". ә ف‎ ь-4 E ^ 


we \A/ADALIAI(CS 
VV AW AS. IN К = 


AWAN MILITARY INSTALLATION [ 
` |52 


( 


f. OFF LIMITS TO 
UNAUTHORIZED PERSONNEL- ` 


AUTHORITY: Internal Security Act, 50 

ANI NO U.S.C. 797 | 
: 65 | PUNISHMENT: Up to one year 

АД 5 < С and 55,000. fin 


x | z ” 
X Y X Y Ww Ужин < < 


imprisonment , 7 
e. 


24 1 


сте, 


y 


AREA 51 AND S4 IN RELATION TO LAS VEGAS. 


Basin and 


Mot 
Range 
Notional 
е > Monument 
/ 
«Inyo Майопа! 
Forest ! 
| White Mountains 
Ansel Айат ` | Wilderness 
Wilderness 
75 
Sierra National | Nevada 
Forest “Test and 
Training 
Flectronic Ran e 
john Мии Combot Nevada g 
Vilderness gfe National (N TTR) 
( ) 
Desert 
Sequoia- Inyo- Mountains National 
Kings Canyon Wilderness Wildlife 
Wilderness Refuge 
nil Death Valley 
National National 
T Park 
[ “Visalia i t è Gorden Spring 
irout Wilderness RED THY ine 
Pahrump Notional у / 
Recreation’: Las Vegas 
Area [ 
| Porterville ЦД. 
| Г Hende 
Sequoia 
Notional 
Forest Naval Air 


Warfare 


| Center 
Po | зер China Lake 89 / 340 'angston 100 / 570 
у 


?nnne 


USA - AREA 51 MAIN BASE AND AIRPORT. 


LS 


и. You 


2105 Angeles 


5% 
<; “ы 
a T 


Зап Francisco 


WHERE IS AREA 51? 


шы 
со 
ж 
< 
ос 
> 
а- 
шы 
= 
>= 
y. 
е 
e 
№ 
ж 
t5. 
ж 
5 
=H 
c 
ad 
= 


шн. m. | 


LT 104 


T ащ 
в 


This is what it looks like when you dump tunnel rubble from а TBM, 
the Tunnel Boring Machine. 


аха тесто асеў 
= 


329/590 


AREA 51 CIA AIRPORT AND 
RESEARCH AND DEVELOPMENT 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


548 / 569 548 / 570 


E 
° 
z 
a 
E 
5 
° 
3 
E 
o 
+ 
° 
š 
Š 
£ 
- 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


556 / 569 556 / 570 


CHEAP NAVY / SHIP RADAR FROM RAYMARINE. == 


\ 
SENSITIVITY 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


560 / 569 560 / 570 


474-443 aac Ж тж 
| у 
o 


„= A 
a 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


563 / 569 563 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


565 / 569 567 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


562 / 569 562 / 570 


Here is how you build a DIY (Do It Yourself) Radio If you look closely, the left black antenna metal plate is flat against 

Warfare Defense System for less than $ 100.00 USD. E M the ceiling. The second (right plate) is about 3 centimeters below the 

28 ^ ] ceiling. Both plates are perforated with holes (see close-up at the 
bottom left). Then a power cable with crocodile clips is connected 
between the two plates (or more correctly, the 2 black ceiling 
antennas). This interconnection of the plates makes the signal hit 
the metal plates slightly differently in time, and the cable between 


them short-circuits the signal. To provide good peace of mind 
throughout the installation room, you should then connect a ground 
cable to the short-circuit cord, to guide everything present in the 
black antennas straight down into the ground. What would now have 
been microwaves in the room, which bounce around, are first 
collected, then short-circuited with themselves, and the residues are 
then led down and neutralized in the ground or soil. 


The left one is flat against the ceiling. The right one is 2 to 3 cm 
from the roof. Both antennas are perforated with holes. 


Grounding kit. Drill and 15 meter satellite cable - $ 15.00 USD. 
Use only the center copper wire. The outer protects the ground wire. 
Connect the center wire to the top and hit the drill into the ground. 


н: 


fea This microwave oven 


door stops 1 KW. 


ие am ту 
MICROWAVE OVEN DOOR WITH NET HOLES. ¿BB DEDE = ê rab un 


An even more powerful construction can be achieved by applying heavy magnets to the construction. | can show you later. 


522222111113. 
222111111141) 
212111111111) 
222241411144. 


711222422222 осоо» 
"771222242444 44444 44-4 


A 
^ 
^ 
^ 
a 
^ 
^ 
a 
a 
^ 
^ 
a 
^ 
a 
a 
^" 
“ 


"e "$5205232025052$52523552522252 


You can contact me at security.terminal@gustavnorstrom.com - ог via telephone - 00 46 073 970 26 00. 
This working prototype can be studied where it is built in Sweden. Heden 132 Bolinas, 821 31. 


— Го? course have more advanced systems, but this опе is cheap, works and provides relax for your head. 


Owner of this Website and Military Contractor: Mr. Gustav Norstrom. 
w Working on the behalf of The Royal Kingdom of Sweden. 


Direct Telephone Number: 00 46 (0) 73 970 26 00. 


121/ 569 


—— dec ы Жо 


SATELLITE HIJACK 


ANTENNA. ATCHING PLATES. ALKIES FROM ñ 
BAOFENG ІМ 
HINA. 
| 
: | | 4 | | | i 
| ‘SWEDISH FLAG. 
_ \ 
PRINTED | 
‚ № ~ 
GRAFITTI ? í A 
IMAGE FROM | ES í 
LOS ANGELES. | та 
ANOTHER SATELLITE 
ANTENNA. 
OLA WALL PROJECTOR 
` E —— 
- l А - um + 
ХУА 5-4 [ANTENNA-CONSTRUCTION] 2 -— № 
7“ : - ; , SIGNAL таа 
SOLDER! ке 


STATION 


BY GUSTAV NORSTRÓM. 


INVESTIGATION-FACTFI NDING-EXPERIMENTAT ON. 


MY RESEARCH AREA. e 


ELECTRIFIED MICROWAVE 


1 WALKIE- 


A AMMUNITION BOXES . 
MOSTLY CALIBER 
алон р ы | UN 7.62 тт. 


1565 / 570 


END NOTE. 
2 X SPEED OF LIGHT. 


FLASHLIGHT. 


Albert Einstein said that nothing could travel faster than the speed of light. 

It was a popular thinking for some time. —But it'S wrong. —1 say. 

--ІГІ throw away a flashlight, at the speed of light, and then turn on the light (pointed forward іп the throw 
direction). The light will travel away from the flashlight at a 2 X SPEED OF LIGHT. That's it. 

Like, if you drive a car at 100 kilometers per hour. (100 KM/H - 62 MPH/Miles Per Hour). 

And then turn on the headlights, full power. The CAR HEADLIGHTS will travel at LIGHT SPEED ғ 100 
KM/HOUR. Your CARS BACKTAIL LIGHTS will send out RED LIGHT at LIGHTSPEED minus 100 КМ/Н. 

The lightsource is already moving. / GUSTAV NORSTRÓM. SWEDEN. 740621-1750. 


T 


567 / 569 277 / 340 568 / 570 


Gustav Norstróm 


U.S. Department of Defense 


568 / 569 569 / 570 


TOP SECRET//SI/TK//NOFORN 


ЕУ 2013 


Congressional Budget Justification 


Volume I 


NATIONAL INTELLIGENCE PROGRAM SUMMARY 


FEBRUARY 2012 


TOP SECRET//SI/TK//NOFORN 


“WA WR  TOPSECRET/SI/TK//NOFORN LA BN 


АҒ. 


Access to the information in this document 
is restricted to US citizens with active SCI 
accesses for SPECIAL INTELLIGENCE and 
TALENT-KEYHOLE information. 


DISSEMINATION CONTROL ABBREVIATIONS 
NOFORN - Not Releasable to Foreign Nationals 
This Component Budget of the National Intelligence Program is 
produced pursuant to provisions of Executive Order 12333, as 
amended by Executive Order 13470, and section 102A(c) of the 
National Security Act of 1947, as amended. 


NATIONAL SECURITY INFORMATION 


Unauthorized Disclosure Subject to Criminal Sanctions 


" —— ш ит жо жї у 
АФ 7 24.2 2.2 22.2 АУ АР #7 АР У Др 


МАЛЧА, TOP SECRET//SI/TK//NOFORN N, @, W. 


TOP SECRET//SI/TK//INOFORN 


(U) DIRECTOR OF NATIONAL INTELLIGENCE STATEMENT 


(U//FOUO) The Intelligence Community (IC) is crucial to ensuring the Nation's safety and security. We face 
worldwide threats that are expanding in scope and complexity. This Fiscal Year (FY) 2013 National Intelligence 
Program (NIP) budget reflects hard choices to ensure critical national security requirements are addressed in the 
face of a reduced budget environment. We must be prepared to accept -- and manage -- reasonable risk. 


(U//FOUO) Keeping America safe by providing the finest intelligence support to our policymakers, military, 
law enforcement partners, and allies remains our highest priority. With the superb talent and ingenuity of our 
workforce, the IC will continue to deploy the most technologically sophisticated and innovative intelligence 
capabilities in the world. Through integration and efficiency, we will sustain responsive, insightful intelligence 
support. 


(S//NF) The FY 2013 NIP budget of $52.6 billion (including $4.9 billion for Overseas Contingency 
Operations (OCO)) and 107,035 positions supports the National Intelligence Strategy and advances our Nation's 
security priorities. This budget represents a decrease of $1.3 billion, or 2.4 percent, below the FY 2012 enacted 
level; and it reduces personnel by 1,241 positions, or one percent. The request meets the fiscal demands laid out 
in the Budget Control Act by setting the IC on a path to reduce expenditures by $25 billion for ten years; with 
over $15 billion of that amount saved by FY 2017. 


(U) Developing a Balanced Intelligence Budget 


(S) The IC leadership worked as a corporate body to develop the budget. The team first drew on lessons learned 
from the drawdown іп the 1990s, which left the IC with a distorted workforce that lacked sufficient mid-career 
personnel and technical expertise. As a result of that drawdown, the IC reverted to extraordinary measures to 
rebuild and balance the workforce. Moreover, we deferred infrastructure recapitalization, resulting in obsolete 
facilities, single point failures, and inadequate power, space, and cooling. We also delayed investment, reducing 
our ability to keep pace with technical advances to meet mission needs. 


(U) Second, we looked forward to determine how best to meet increasing mission requirements over the next 
decade in a resource-constrained environment. The IC leadership weighed the relative merit of capabilities and 
looked at dependencies across the components. In addition, we coordinated closely with the Defense and domestic 
departments to minimize disconnects and ensure balance. 


(S) At the outset, I determined that we would not take a proportional reduction from each IC program, but 
rather compare relative merits of programs. We carefully weighed cost and risk to understand both the short 
and long term impact of our actions. To maximize investments for the future, we focused reductions on lower 
priority capabilities; sought efficiencies and smarter ways to do business; and prudently accepted risk. Overall, 
this budget is guided by the imperative to achieve the right balance against competing demands. Our guiding 
principles were to: 


е (U) Sustain a skilled workforce; 
e (U) Focus on further integration and collaboration; 


e (U) Bolster agile capabilities that support multiple missions; 


* (S) Enhance counterintelligence; and 


e (U) Protect key investment for the future. 


TOP SECRET//SI/TK//INOFORN 1 


TOP SECRET//SI/TK//INOFORN 


(U) Reductions 


(U) To the extent possible, we protected the activities highlighted above; but with the magnitude of the 
reduction, we could not avoid limited, targeted cuts to priority areas. The following are some activities reduced 
from the base budget plan: 


(S//NF) Sustained Congressional Cuts. We sustain FY 2012 cuts to the CIA's Global Deployment Initiative 
and NRO's Integrated Ground Architecture. 


(S) Workforce. We continue Congressional reductions to the government workforce; curtail plans for future 
personnel growth, and take targeted reductions to baseline personnel where the risk can be managed. 
Furthermore, we reflect savings from a lower than projected civilian pay raise and continue to reduce our 
reliance on core contractors. 


(TS//NF) Operations. We decrease collection, production, and hard copy media generation in the GEOINT 
system, slow SIGINT network exploitation and processing modernization; cut GDIP HUMINT, non-core 
MASINT, covert action programs, and some Specialized Reconnaissance Programs (SRP) operations; 
and streamline the ODNI business transformation activities. Furthermore, we discontinue or terminate 
some lower-priority missions, such as de-orbiting the Baseline ONYX satellite and transferring funding 
responsibility to the MIP for legacy satellites. 


(S//TK//NF) Long-Term Investments. We are terminating an NRO compartmented project, delaying 
TOPAZ performance enhancements until the second generation of TOPAZ satellites; and reducing 
technology insertion opportunities in other satellites. In addition, we are delaying some SRP investments 
and terminating the Community’s investment in a consolidated human resources information system. 


(S//NF) Infrastructure. We reduce enterprise management activities; eliminate the IC Data Center; 
downsize the IC Bethesda Campus; suspend some facility improvements; and delay the replacement of 
aged facility components. As a result, we will continue to house some of the IC workforce in older and less 
capable facilities that may not meet current antiterrorism/force protection requirements and we will accept 
some degradation in the IC’s facility condition index. 


(S//NF) Information Technology. We reduce capital equipment replacement and recapitalization; decrease 
support for heritage systems; delay consolidation of older systems; and eliminate plans for additional backup 
systems. These offsets prevent spending to sustain or improve legacy environments when our direction is 
to establish a new IT environment based on more centralized common services. Investments required to 
establish a more efficient IC IT Enterprise are protected. 


(U) Investments 


(U) Although the budget is declining, the mission is not. Prioritizing our requirements was a key element to 
produce a budget that meets customer needs, supports critical capabilities, addresses gaps, and helps to maintain 
a strategic advantage. In the FY 2013 NIP budget, the IC makes targeted investments in: 


(TS//SU/NF) Signals Intelligence (SIGINT). We are bolstering our support for clandestine SIGINT 
capabilities to collect against high priority targets, including foreign leadership targets. Also, we are 
investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit 
internet traffic. 


(S//NF) Cybersecurity. As the cyber threat continues to grow, we sustain the budget for the Comprehensive 


National Cybersecurity Initiative and begin construction of a second High Performance Computing Center 
at Fort Meade, Maryland to keep pace with cyber processing demands. 


TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//INOFORN 


e (TS//NF) Counterintelligence (CI). To further safeguard our classified networks, we continue to strengthen 
insider threat detection capabilities across the Community. In addition, we are investing in target 
surveillance and offensive CI against key targets, such as China, Russia, Iran, Israel, Pakistan, and Cuba. 


е (S//TK//NF) Major System Acquisitions (MSA). We are sustaining the acquisition baseline and maintaining 
the schedule for the MSAs that replace current capabilities. For example, the NRO is modernizing overhead 
SIGINT, geospatial, and communications major system acquisitions. To reduce reliance on the Tracking and 
Data Relay Satellite System (TDRSS), the NRO begins investing in a special communications capability. 
Also, launch requirements are fully funded. 


* (S//NF) Ballistic Missile Collection. We are pursuing an affordable MASINT solution for integrating, 
improving, and sustaining coverage of and collection against North Korean, Iranian, Chinese, Russian, 
Pakistani and other ballistic missiles threats. 


° (S//NF) Mission Focused Science & Technology (S&T). We continue investing in cutting edge S&T that 
enables new mission capabilities. We are tackling hard problems in quantum computing, biometrics, cyber, 
weapons of mass destruction, and large complex data sets. 


(U) Optimizing Our Efforts 


(U) To succeed, the IC must employ its resources judiciously. The need to integrate all elements of the IC 
is essential to identify opportunities as well as dangers. In FY 2011, the elimination of Usama Bin Ladin along 
with 32 other high value targets is just one testament to IC collaboration. Our ability to rapidly respond to 
the requirements of Operation Unified Endeavor, while simultaneously maintaining support for operations in 
Afghanistan, Iraq, and around the world, is another. We achieved this by reducing the cultural, technological and 
policy barriers to sharing information, and exploring new strategies for integrating our intelligence efforts. The 
FY 2013 budget sustains the imperative of integration, and provides the framework and common solutions to 
further collaboration. 


(U) Focusing on Integration 


(U) The Office of the DNI has promoted information sharing and collaboration through the integration of 
analysis and collection at the strategic level. This has improved mission management of key intelligence problems, 
leading to a sharper focus on, and encouragement of, integration within the Community. The heightened attention 
on intelligence integration has changed the dynamics of intelligence activities. Without requiring individual IC 
elements to reorganize, the emphasis on integration has led Community elements to think and operate in ways 
that are responsive to strategic management and direction that encourages, recognizes, and rewards integrated 
intelligence operations. 


(U//FOUO) The National Intelligence Managers (NIM) are the principal agents of mission integration. They 
oversee and integrate all aspects of the IC's efforts against a particular regional or functional problem to provide a 
more complete understanding of the associated issues. A major responsibility includes the development, planning, 
execution, and oversight of Unifying Intelligence Strategies (UIS) for their individual accounts, with the principal 
aim of managing the relevant policies, priorities, and relationships among the IC elements who participate in 
each of these target domains. 


(U//FOUO) These UIS are the instruments that are used to integrate IC efforts against critical priorities. Each 
UIS supports decision-making by outlining gaps and challenges, as well as opportunities that would most benefit 
from integration of IC efforts. In addition, the UIS present a select number of integration initiatives to provide 
a holistic perspective across the strategies. 


TOP SECRET//SI/TK//INOFORN 3 


TOP SECRET//SI/TK//NOFORN 


(U) Promoting Information Sharing 


(U) Information sharing also is a critical enabler of integration across the Community. This budget begins to 
implement a restructuring of the IC information technology (IT) architecture that will provide a strong backbone 
enabling greater IC integration, information sharing, and improved safeguarding of networks. The need for the 
IC to contribute to deficit reduction was the catalyst for achieving greater efficiencies in information technology. 
The IC IT Enterprise will transform from agency-centric IT programs which are often duplicative and costly, to 
greater centralization of common services for IC-wide use. Within this framework, we are leveraging existing 
efforts across the Community and sustaining unique approaches only when they are essential to the mission. 
Furthermore, we are investigating data management solutions and their associated security issues, such as the 
viability of comingling data in virtualized data stores to facilitate analytical integration of different data from 
different sources and Agencies. This includes new management and operating practices for the secure storage and 
handling of the varied information contained in different intelligence systems through the use of cloud computing. 


(U) Engaging Partners 


(U) Expanding the IC's culture of sharing with our partners is essential to leverage and maximize our collective 
capabilities. We are strengthening relationships with federal, state, local, tribal, and international partners to fuse 
domestic and foreign intelligence to quickly understand and act on threats. Through coordinated efforts, we can 
optimize our efforts to improve intelligence support. 


(U) As part of the Administration's overall foreign trade initiative, the IC will more closely coordinate its 
intelligence gathering and analysis efforts with federal agencies responsible for monitoring foreign trade barriers 
and enforcing U.S. trade rights under international trade agreements. The IC will directly support and strengthen 
U.S. interagency trade enforcement efforts to address unfair trade practices through the World Trade Organization 
and under other domestic and international trade enforcement authorities 


(U) Furthermore, the IC is postured to support the warfighter as the Department of Defense implements a new 
strategy. The strategy is consistent with the IC approach to the FY 2013 budget. We will support the increased 
focus on the Pacific region, and surge as needed for military operations. In addition, we expect there will be a 
greater reliance on the IC to provide global coverage and warning of emerging threats. 


(U) Aligning Resources 
(U) This year, the IC implemented guiding principles to clarify responsibility for programming NIP resources. 


(S) The IC developed guidelines to more clearly delineate programming responsibility for the NIP and the 
МІР to further optimize resource allocation. These guidelines better align МІР and МІР resources with mission 
requirements, reduce the number of split funded projects, and enable more efficient budget execution. The 
FY 2013 budget begins to implement the guidelines by transferring $165 million and 1,078 positions between 
the NIP and MIP. This transfer maintains the mission, function, and execution of activities; it does not represent 
growth in either program. 


(S) In addition, the DHS Office of Intelligence and Analysis (I&A) implemented a change in how it accounts 
for resources that support the intelligence mission. Beginning in the FY 2013 budget, activities that predominately 
support departmental missions are funded outside the NIP. Under the new methodology, $11 million and 
44 positions are transferred out of the NIP. 


(U) Supporting Current Intelligence Operations 
(S//NF) In FY 2013, the IC will continue to provide crucial intelligence support to military operations in 
Afghanistan and to combat terrorism worldwide. 


(S//SI//NF) The request for Afghanistan and Pakistan decreases as support for the military's counterterrorism 
and counterinsurgency operations declines, coincident with planned troop reductions. Accordingly, this request 
sustains HUMINT and CI operations, along with the related analytic, processing, and exploitation capabilities. 


4 TOP SECRET//SI/TK//INOFORN 


TOP SECRET//SI/TK//INOFORN 


Also, NSA is augmenting SIGINT access and penetration, and Treasury enhances threat finance analysis to track 
terrorist and insurgent networks. 


(TS//NF) With the completion of the military drawdown in Iraq, intelligence support transitions to a smaller 
long-term presence. The IC's request is significantly reduced from FY 2012 as our support focuses on providing 
foreign intelligence in support of diplomatic activities and monitoring Iraq's plans and intentions and those of its 
volatile neighbor, Iran. This budget sustains HUMINT operations, with a smaller footprint, as well as SIGINT 
collection capabilities. Most support for media exploitation, commercial imagery, and other operational enablers 
is eliminated. 


(TS//NF) The counterterrorism (CT) mission requires a global perspective to predict, penetrate, and preempt 
global threats to U.S. security. Therefore, the IC is sustaining operations, analytic, and enabling activities. With 
Yemen, Somalia, and other Horn of Africa countries emerging as the most recent breeding ground for terrorism, 
the IC is increasing efforts in those regions. Furthermore, we are sustaining CT capabilities in Libya to deny 
extremists a safe haven. In an effort to reduce our reliance on OCO as a funding vehicle, we transfer to the base 
some enduring long term activities. 


(S//NF) The counterproliferation (CP) mission continues to support a variety of actions to deter, disrupt, and 
prevent proliferation. This includes improving our understanding of Pakistani nuclear weapons and dangerous 
nuclear material security; intelligence on proliferators, such as Iran and North Korea, to roll back and block 
weapons programs; increasing our ability to ascertain global chemical and biological threats; and better 
integrating multidiscipline coverage of WMD targets such as chemical weapons in Libya and Syria. 


(U) Moving Forward 


(S//NF) Today's national security threats virtually defy rank-ordering. Capabilities, technologies, know-how, 
communications, and environmental forces are not confined by borders, and can trigger transnational disruptions 
with astonishing speed. Never before has the IC been called upon to master such complexity and so many issues 
in such a resource-constrained environment. We are rising to the challenge by continuing to integrate the IC, 
capitalize on new technologies, implement new efficiencies, and, as always, remaining vigilant 24/7 worldwide. 


(U//FOUO) The pressure to maintain the world's premier intelligence enterprise in the face of shrinking 
budgets will be difficult. We will accept and manage risk, more so than we've had to in the last decade. 


(U//FOUO) This NIP budget proposed is balanced and executable. It does not reflect the potential for a 
sequester in January 2013. Instead, the FY 2013 President's Budget proposes savings in other areas that exceed 
the Joint Committee threshold, and as a result seeks to cancel the automatic reductions and restore the caps to 
the original definitions in the Budget Control Act. 


(U) Intelligence 15 the first line of defense. This budget provides the programs and initiatives vital to our 
national security. Our partnership with you -- our Congressional oversight committees -- is critical to our 
collective success. With your continued support, the IC can continue to fulfill our mission to keep America and 
its interests secure. 


we Маре 


TOP SECRET//SI/TK//INOFORN 5 


TOP SECRET//SI/TK//INOFORN 


FY 2013 Mission Objective Funding* 


$52.0 Billion 


CIARDS funding not included. 


Enhance 
Cybersecurity 
8% 
Integrate 
Counterintelligence 
796 


Combat Violent 
Extremism 
3396 


Provide Strategic 
Intelligence and Warning 
39% 


Counter Weapons 
Proliferation 
13% 


* MO6: Support to Current Operations is covered іп other МО sections. 


Figure 1. 
This Figure is SECRET//NOFORN 


118030 vol01 ill01.ai 


TOP SECRET//SI/TK//INOFORN 


TOP SECRET//SI/TK//INOFORN 


FY 2011 Intelligence Community Civilian Workforce 


Grade Distribution by Average Age 


30000 —— Y h U R 15 
25,000 — 
— 60 
2 
m 
S 20000 — и B 
8 = -45 Š 
- 
1 р. = ka 
° 5,000 m 5 
8 - 30 Е 
E 10,000 — 3 
< m 
= m — 15 
5,000 B Ы _ 
= Ш 
о ———— не ние ни мын мае ни ни ми ны | _ | | ‚ _ Lo 
Grade (57-10 GS 11-12 GS 13-14 GS-15 ae Payband Payband Payband mem SES 
6 Below 1 2 3 4 5 
Ш Average Age ІП Average Years of Service 
Grade by Years of Service 
100 
ш >35 
Ш 31-34 
" 80 — m 26-30 
o Ш 21-25 
е ш 16-20 
м Ш 11-15 
= Е E 
z 60 m 6-10 
5 ш 1-5 
Ф 
1 
@ 40 — ш < 
t 
o 
е 
o 
E 20 — 


Grade | GS 7-10 GS 11-12 GS 13-14 GS 15  Payband Payband Payband Payband Payband SES 
6 Below 1 2 3 4 5 


Note: This chart contains data adjusted to facilitate display іп whole percentages only and some categories with <0.50% will display ав 0%. Actual percentages are available upon request. 


Figure 2. 
This Figure is SECRET//NOFORN 118030. vol01 ill02.ai 


TOP SECRET//SI/TK//INOFORN 67 


TOP SECRET//SI/TK//INOFORN 


FY 2011 Intelligence Community Civilian Workforce 


Years to Optional Retirement 


Analysis & Production 
Collection & Operations 
Enterprise IT 

Enterprise Mgt & Spt 


Mission Mgt 


Budget Category 


Processing & Exp 
Research & Tech 


Total 


Percentage of Workforce 


WiRetElig. Ш<1 N2 ШЗ N4 №5 86-10 811-15 Ш16-20 821-25 126-30 831-35 №>35 


Note: This chart contains data adjusted to facilitate display in whole percentages only and some categories with «0.5076 will display as 0%. Actual percentages are available upon request. 


Budget Category by Grade Levels 


Analysis & Production 
Collection & Operations 
Enterprise IT 

Enterprise Mgt & Spt 


Mission Mgt 


Budget Category 


Processing & Exp 


Research & Tech 


o 
N 
o 
B 
o 
o 
© 
со 
© 
EN 
o 
o 


Percentage of Workforce 


Е Grade Ш GS 7-10 № GS 11-12 EGS 13-14 Ш GS 15 Bl Pay Band 1 M Pay Band 2 В Pay Band 3 В Pay Band 4 В Pay Вапа 5 № SES 

ы Note: This chart contains data adjusted to facilitate display іп whole numbers only. Actual figures are available upon request. 
Figure 3. 

116030 уо101 ill03.ai 


This Figure is SECRET//NOFORN 


68 TOP SECRET//SI/TK//INOFORN 


TOP SECRET//SI/TK//INOFORN 


FY 2011 Intelligence Community Workforce 


Total Civilian, Military, and Contractor Personnel Workforce 
by Personnel Type and Budget Category 


Civilian 
Military 
Contractor 


Total Workforce 


By Personnel 
Type 
HES 


ш Mission Mgt 


Ш Collection 
& Operations 


Civilian Personnel 


Military Personnel № Processing & Exp 


№ Analysis 8 
Production 


W Research & Tech 
Wi Enterprise ІТ 
m 


Contractor Personnel 


By Budget Category 


Total Workforce 


Enterprise 
0 20 40 60 80 100 Mgt & Spt 


Note: This chart contains data adjusted to facilitate display in whole percentages only and some categories with «0.5096 will display as 0%. Actual percentages are available upon request. 


Civilian Workforce/Attrition 


100,000 Ыб 
82,363 84,159 83,675 
80,000 — US 
—4 
60,000 — 
=3 
40,000 — 
—2 
20,000 — 4 
0 0 
FY11 FY12 FY13 
ШЇ + Positions —1 — % Attrition (FY11 Actual, FY12-13 Projections) 
Figure 4. 
This Figure is SECRET//NOFORN 118030. vol01 ill04.ai 


TOP SECRET//SI/TK//INOFORN 69 


TOP SECRET//SI/TK//INOFORN 


FY 2011 Intelligence Community Workforce 


Military Workforce/Fill Rates 


25,000 

20,000 — 
15,000 — 
10,000 — 


5,000 — 


FY10 FY11 


№ Military Filled [E] Military Unfilled 


Foreign Language Proficiency Payments: 


Total NIP* 
Top Foreign Special Interest 
Languages Civilian Languages Civilian 
Spanish 2,725 Tagalog 62 
French 827 Indonesian 48 
Chinese (All Dialects) 903 Hindi 73 
Arabic (All Dialects) 1,191 Somali 5 
Russian 736 Pashto 88 
German 521 Persian - Afghan (Dari) 96 
Korean 490 Urdu 89 
Persian (Farsi) - Iranian 357 Punjabi 45 
Portuguese 295 Hausa 3 
Other Languages ** 1,639 
Total 10,193 Total Special Interest 509 


*Includes payments to 7,507 U.S. Government civilian personnel in CIA, 
DIA, FBI, NGA, NSA, and others included in the program volumes. 


**There are up to 71 "Other" Languages for which proficiency payments 
are made. The complete list is available upon request. 


Figure 5. 


This Figure is SECRET//NOFORN 


118030 vol01 ill05.ai 


70 


TOP SECRET//SI/TK//INOFORN 


TOP SECRET//SI/TK//INOFORN 


FY 2013 Request by Program 


$52.6 Billion 


State -r Treasury 
«196 «196 


SRP 
296 L: 


NGP 
9% 


GDIP 
8% 


Energy -/ 


<1% 
DOJ 
6% 


CIAP 
28% 


CMA 


CIARDS 
° 1% 


DoD-FCIP 
1% 


1% 


Figure 6. 
This Figure is SECRET//NOFORN 


116030_vol01_ill06.ai 


T2 TOP SECRET//SI/TK//INOFORN 


TOP SECRET//SI/TK//NOFORN 


Central Intelligence Agency Program 


FY 2013 
Funding by Budget Category 


Processing & Exploitation 


% 


Mission Management Research & Technology 
<1% | 1% 
r —- Analysis & Production 
7% 


Enterprise Management 
& Support ` 
7% 


Enterprise IT — 


4% 


Collection & Operations 


78% 
Funds FY 2004 - FY 2013 Positions FY 2004 - FY 2013 
25,000 
20,000 — 
o 
5 
Е 15,000 — 
> 
E 
nd 
E: 10,000 — 
o 
A 
5,000 — 
Q لل‎ LL | LL. L J 
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 
Figure 7. 
This Figure is SECRET//NOFORN 118030. vol01 ill07.ai 
74 TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//INOFORN 


Community Management Account 


FY 2013 
Funding by Expenditure Center 


Analysis 

3% Enterprise IT 
Systems 
10% 


Research & 
Technology 
20% 


Enterprise 
Management 
36% 


Mission Management / 


Tasking 
31% 
Funds FY 2004 - FY 2013 Positions FY 2004 - FY 2013 
2,500 — ——————— 2,500 
2,000 — 
o 
5 
= 1,500 — 
= 
Е 
2 
3 1,000 — 
© 
a 
500 — 
إا | إا | ا ا الل ں0‎ | | 
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 
Figure 9. 
This Figure is SECRET//NOFORN 118030. vol01 ill09.ai 


80 


TOP SECRET//SI/TK//INOFORN 


TOP SECRET//SI/TK//NOFORN 


Consolidated Cryptologic Program 


FY 2013 
Funding by Budget Category 


Research & Technology 
0, 


4% 


| Analysis & Production 


14% 


Processing & Exploitation 
о, 


о 


Mission Management 
3% 


Collection & Operations 


23% 
Enterprise Management 
& Support 
26% 
Enterprise IT 
15% 
Funds FY 2004 - FY 2013 Positions FY 2004 - FY 2013 
uu E БЕРЕН аны 

27000 — 
o 
С 
9 
= 
© 18,000 — 
2 
0 
© 
a 

9,000 — 

gll l---- 
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 
Figure 10. 

This Figure is SECRET//NOFORN 118030. vol01 ill10.ai 


84 TOP SECRET//SI/TK//INOFORN 


TOP SECRET//SI/TK//INOFORN 


National Reconnaissance Program 


FY 2013 
Funding by Budget Category 


Research & Technology 
0, 


4% 


Processing & Exploitation 
% 


Collection & Operations 


Enterprise Management 59% 
& Support 
8% 
Enterprise IT 
5% 
Funds FY 2004 - FY 2013 Positions FY 2004 - FY 2013 


12,000 ———————————— 3,000 


pp == == "== 


А 2,000 - 
2 
> 
E 
o 
2 
20% 
© 
© 1,000 — 
Q — LLL... 
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 
Figure 14. 
This Figure is SECRET//NOFORN 118030. vol01 ill14.ai 


100 TOP SECRET//SI/TK//INOFORN 


Resource Exhibit No. 1A 
National Intelligence Program 
Funds by Program 

FY 2011 – FY 2017 


This Exhibit is SECRET//NOFORN 


TOP SECRET//SI/TK//NOFORN 


(Dollars in Thousands) 


FY 2012 - FY 2013 


Change FY 2013 - 
FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 FY 2017 
Program Actual  Appropriated Base oco Request Funds Percent Total! 
CCP 10,737,163 10,514,035 10,036,851 730,914 10,767,765 253,730 2 50,652,537 
CIAP 14,652,379 15,332,901 12,037,708 2,672,317 14,710,025 -622,876 -4 64,567,982 
CIARDS 292,000 513,700 514,000 — 514,000 300 — 2,570,000 
CMA 2,063,394 1,870,255 1,676,387 — 1,676,387 -193,868 -10 10,274,665 
DHS 275,136 307,359 284,332 — 284,332 -23,027 -7 1,462,089 
DoD-FCIP 517,720 505,895 456,475 72,485 528,960 23,065 5 2,487,905 
DOJ 2,978,329 3,010,795 3,019,958 — 3,019,958 9,163 — 15,596,944 
Energy 163,700 186,699 188,619 — 188,619 1,920 1 943,095 
GDIP 4,767,009 4,815,583 3,655,662 714,480 4,430,142 -385,441 -8 19,901,677 
NGP 5,227,945 5,041,569 4,339,195 539,735 4,878,930 -162,639 -3 22,786,959 
NRP 11,401,745 10,411,335 10,268,773 53,150 10,321,923 -89,412 -1 54,842,860 
SRP 1,466,792 1,267,751 1,099,820 33,784 1,133,604 -134,147 -11 6,010,922 
State 68,773 68,203 72,655 — 72,655 4,452 7 377,056 
Treasury 27,422 27,123 27,297 — 27,297 174 1 138,274 
МР Total 54,639,507 53,873,203 47,677,732 4,876,865 52,554,597 -1,318,606 -2 252,612,965 
IFY 2013-2017 Total includes the ОСО Request for FY 2013 only. 
ТОР SECRET//SI/TK//NOFORN 133 


TOP SECRET//SI/TK//NOFORN 


Resource Exhibit No. 1B (Number of Personnel) 
National Intelligence Program (Number of Positions) 
Total Personnel! and Total Positions? by Program 

FY 2011 - FY 2013 

This Exhibit is SECRET//NOFORN 


FY 2012 - FY 2013 FY 2012 - FY 2013 
FY 2011 Actual FY 2012 Authorized FY 2013 Request Change Change 
Total Total Total Total Total Total Total Total 
Program Personnel Positions Personnel Positions Personnel Positions Personnel Percent Positions Percent 
CCP — 3436] 3436] 35083 35083 3490 — 3490 ыу лл  -18 — 4 
CIAP 2126 2146 2220 21459 22200 у —  —  —  — 
GARD a О шш ле д. (522. 42-52-4222 = у 5 
CMA 179 з 172 194 183 199 л 4 35 Q0 
DHS 2768 88 94 100 885 95 35  —6 35 4 
DoD-CIP 2099 212 2132 227 221 232 19 6 Ws 5 
DO) 1480 15097 1508 1535 1502 1538 шы о 4  -— 
Energy 199 19 198 8 9 19 1 1 1 1 
GDP 17202 1832 — 1130 1897 1729 1794 эз з 8035 3 
NGP 875 868 883 892 851 8484 240230 мм 6 
NRP е лә қы 2783 204 2773 3 ПП 
SRP 29 29 w 29 w 239  — -—  -—  — 
Stae 39900900 384 3X3 34 3 1 3 1 
МІР Total 104905 106467 107389 108276 106,777 юз чє чм è 4 


! Total Personnel is the sum of Civilian FTEs and Military Positions and excludes Foreign Indirect Hires. 


^ Total Positions is the sum of Civilian Positions and Military Positions and excludes Foreign Indirect Hires. 


134 TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//NOFORN 


Resource Exhibit No. 2A (Dollars in Thousands) 
National Intelligence Program 
Funds by Program and Service/Agency 
FY 2011 - FY 2017 
This Exhibit is SECRET//NOFORN 
FY 2012 - FY 2013 


Change 
Service/ FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 FY 2013 - 
Program Agency Actual Appropriated Base осо Request Funds Percent FY 2017 Total! 
Department of Defense, МР л 
CCP AirForce 164934 168497] 151833 3523 16136 м а 830815 
“Army 108003 107912 74444 21603 9604]  -1L865 И 397401 
Cure. = 837 1,046 E 1,046 209 25 5,404 
NSA 10,394,017 — 10,177,996 9,750,818 705,788 10,456,606 278,610 3 49,141,080 
Navy 70,209 58,793 52,710 = 52,710 -6,083 -10 277,837 
ССР Total 10,737,163  10,14035 10,036,851 730914 10767765 253730 2 50,652,537 
CIAP CIA 14652379 15332901 12037708 2,672,217 14710025 -622,876 4 64567982 
CIAPTotl — 14652379 15332901 12037708 2,672317 147100205 -622,876 4 64567982 
CMA AirForce 1390793 1322364 1136135 x LI36135  -186220 м 7384743 
Рор-ЕСІР  AirFoce — 122927 — 103390909 — 8732 — 9903 9725 — 6168  -6 462967 
Amy — 9857 9803 91432 19360 — 11072 — 123533 В 510468 
DIA 162,829 171,927 137,672 30,552 68,224 -3,703 2 760,843 
DSS 3,588 3,625 7,386 = 7,386 3,761 104 36,720 
DTRA 5,593 6,605 9,308 = 9.308 2,703 4l 43,821 
Navy 124,926 122,306 123,355 12,670 36,025 13,719 1 673,086 
DoD-FCIP Total 517,720 505,895 456,475 72,485 528,960 23,065 5 2,487,905 
GDP AirFore 708306 73119] 610153 6844 616997 -114,194 — 6 3442095 
Army 2675315 266867] 200066 23480 — 223546 — 43321 -16 1083545 
DIA 3,225,544 3,267,174 2,412,077 739,613 3,151,690 -115,484 -4 13,186,766 
с — = 479 = 479 479 = 2,173 
Navy 488,152 477,668 432,887 4,543 437,430 -40,238 -8 2,237,100 
SOCOM 77,492 72,683 = = = -72,683 -100 = 
СПР Total |. 42767009 4,815583 3,655,662 774480 4430142 -385,441 -8 19,901,677 
NGP  . AirFoce 1015340 112930 тз  — 114383 14583 1| 5220581 
Amy — 482 52620 — 49052  — 4902 358 26457 
NGA 5,068,107 4,860,907 4,160,116 539,676 4,699,792 -161,115 :3 21,912,709 
Мауу 10,496 15,112 15,644 59 15,703 591 4 87,672 
NGP Tot — — 5,227,945 5,041,569 4,339,195 539,35 4,878,930 116269 3 22786,959 
NRP. NRO 11401745 10411335 10268773 — 53150 10321923 -89,412 — 1 54842860 
МЕР Tot — 11401745 10411335 10268773 53450 1021923 89412 1 54842860 
SRP Navy 1466/92 1267751 1099820 — 33784 1133604 —  -134147 и 6010922 
SRP Tot — — 1466,792 1267751 1,099820 33784 — 1133604  -13414] 11 6010922 
Lm of Defense, NIP 50,161,546 49211433 43,030,619 4,876,865 47,907,484 -1,303,949 ES 228,635,585 
Non-Defense, NIP 
CIARDS  CIARDS — 292000 => 513700 514000 — 51400 | 30 0 257.00 
CIARDS Total 29200 = 513700 514,000 — 51400 30 X o 2570000 
CMA CMA 672601 541890 5402532  .— 54022 —  -1639 - 2889922 
СМА Total — 61,41 541891 5402522 — — 5402532 лз 1 2889922 


TOP SECRET//SI/TK//NOFORN 135 


TOP SECRET//SI/TK//NOFORN 


Resource Exhibit No. 2A (continued) (Dollars in Thousands) 
National Intelligence Program 
Funds by Program and Service/Agency 
FY 2011 - FY 2017 
This Exhibit is SECRET//NOFORN 
FY 2012 - FY 2013 


Change 

Service/ FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 ЕУ 2013 - 
Program Agency Actual Appropriated Base ОСО Request Funds Percent FY 2017 Total! 
DHS 2. 22,687 47,717 51,101 = 51,101 3,384 7 262,715 

DHS 252,449 259,642 233231 = 233,231 -26,411 -10 1,199,314 
DHS Total — 2546 — 307359 28433223 — — — 28332 -23,027 Л 1,462,089 
DO] DEA 158 зт 14123 — 01202244203 73059 

FBI 2,964,751 2,997,148 3,005,835 — 3,005,835 8,687 0 15,523,885 
DOJ Total 2,978,329 3,010,795 3,019,958 — 3,019,958 9,163 0 15,596,944 
Energy Energy 163,700 186,699 188,619 — 188,619 1,920 1 943,095 
Energy Total 163,700 186,699 188,619 = 188,619 1,920 1 943,095 
Treasury Total 27422 лиз 27.2099 | — р 138274 
Non-Defense, МР Total. 4477,961 4,661,770 4647113 — — 4647113  -14657 0 23977380 
National Intelligence Program 54,639,507 53,873,203 — 47,677,732 4,876,865 — 52,554,597 -1,318,606 2 252,612,965 


Total 


IFY 2013 - FY 2017 Total includes the ОСО only for FY 2013. 


136 TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//NOFORN 


Resource Exhibit No. 2B (Number of Civilian FTEs) 
National Intelligence Program (Number of Military Positions) 


Total Personnel by Program and Service/Agency! 
FY 2011 - FY 2013 
This Exhibit is SECRET//NOFORN 


FY 2011 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Change 
Program Service/Agency Total Personnel Total Personnel Total Personnel Total Personnel Percent 
Department of Defense, IP TTT 
CCP  AiFoce 537 545 530 35 
Am 320 330 мз 46 4 
Marine Corps — 393 392 -1 -0 
NSA 20,877 21,650 21,575 -15 -0 
Мауу 4,881 4,425 4,370 -55 -1 
CCPTotal — зв 35083 39 482 4 
CAP CA 2106 эш 2336 — — 
САРТ i 21426 22296 26 
CMA AiFoce 98 102 1M — - 4 
CMA Total g, 402 AM 5 — 
DoD-FCIP _  AirFoce | 0 m  TD6 M 2 
ОО Amy ж зэ 3A 83 10 
DIA 310 336 367 31 9 
DSS 9 9 14 5 56 
DTRA 33 36 40 4 11 
Marine Corps 13 13 17 4 31 
Navy 529 527 536 9 2 
DoD-FCIPTotal = 29 м ot 9 6 
GDP AirFore  à3M| 3234 298 29 8 
КОО Amy  — 104  4M6ó Mu M5 9 
DIA 10,180 10,295 10,653 358 3 
Marine Corps — 224 268 44 20 
Navy 2,459 2,305 2,292 -13 -1 
SOCOM 358 358 — -358 -100 
GDIPToal — M22 1520 QY29 зз 23 
NOP AiFoe  — 24 29») N| 5 23 
(00 Amy 4 250 24 36 4 
Marine Corps — 6 35 29 483 
NGA 8,224 8,233 7,943 -290 -4 
Мауу 25 32 30 -2 -6 
езт. 895 883 8589 эзш 3 
NRP. AiFot MT AST A68  — 4 3 
| Amy 2 02 3m  — .—. — 
NRO 972 976 975 -1 -0 
Мауу 296 296 289 -7 -2 
NRP м0 эз. 29M 3 1 
SRP Nay ж ee 
SRPTotal = 29 >» 249  —  — 
Department of Defense, NIP Total 8788 8998 8936 à 4 
Non-Defene,NIP x т” 
CMA CMA 156 890 и 
СМАТО — OG 60 756 7]  . H 


Excludes Foreign Indirect Hires 


TOP SECRET//SI/TK//NOFORN 137 


TOP SECRET//SI/TK//NOFORN 


Resource Exhibit No. 2B (continued) (Number of Civilian FTEs) 
National Intelligence Program (Number of Military Positions) 


Total Personnel by Program and Service/Agency! 
FY 2011 - FY 2013 
This Exhibit is SECRET//NOFORN 


FY 2011 Actual | FY 2012 Enacted БҮ 2013 Request FY 2012 - FY 2013 Change 

Program Service/Agency Total Personnel Total Personnel Total Personnel Total Personnel Percent 
DHS CGNonDoD > I 259 ж ооо у ту 
| —pHsS 90 | 4b G6  -4d 9 
DHS Total = 72 949 885 85 6 
DO) DEA 38 9 

FBI 14,742 15,000 15,014 14 0 
DOJToal = 1480 15058 ИИ 
Energy Energy 49 оӊ Mw 1 1 
Energy ва 
State State 359 360 363 3 1 
State Total 359 360 363 3 1 
Treasury м 
Treasury Total — 148 18 1856 1 1 
Non-Defense, NIP Total |00 O ma лала 4 o 
National Intelligence Program Total — 104905 107,389 10677 62 1 


Excludes Foreign Indirect Hires 


138 TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 5 (Dollars in Thousands) 
National Intelligence Program 

Budget Authority by Program and Appropriation 

FY 2011- ҒҮ 2017 

This Exhibit is SEC RET//NOFORN 


Program Appropriation FY 2011 FY 2012 FY 2013! FY 2014 FY 2015 FY 2016 FY 2017 
CCP  FamHsyConAF SM зш 2-22 2-0000- 
— C НМА 405 419 3453 348 346 342 3642 
Fam Hsg O&M, DW 10,402 10,250 10,973 11,147 11,335 11,527 11,883 
MilCon, DW 707,947 361,753 562,030 507,553 125,698 53,000 47,321 
O&M, A 108,003 107,912 96,047 72,698 74711 76,287 77,658 
O&M, AF 160,832 164,328 157,893 162,002 161,848 164,988 166,653 
O&M, DW 6,644,135 6,807,617 7,007,018 6757464 6,758,435 6,967,731 7,056,018 
O&M, MC = 837 1,046 1,061 1,081 1,101 1115 
O&M, N 70,209 58,793 52,710 54,756 55,810 56,932 57,629 
P, DW 403,589 336,503 369,762 348,313 323,805 324,545 322,735 
RDT&E, DW 2,627,944 2,661,873 2,506,823 2,370,319 2248074 2,221,552 2,206,019 
CCPTotal 10731163 10514035 10167165 — 10288751 9,764203 — 9881145 — 9,950,673 
САР ОРА 14652319 15332901 14710075 12109861 12299144 12633506 12815446 
CIAPToal 65239 15332900 14710025 12109861 12299144 12,633,506 12,815,446 
CIARDS  CIARDS 292000 513700 51400 51400 514000 514000 514000 
1.” 292,000 513,700 514,000 514,000 514,000 514,000 514,000 
А ICMA 6261 547,891 540252 566850 578,665 597119 607,036 
ПО RDT&E,AF 1399073 1322304 1136135 1,382639 1650208 — 1511045 1704716 
СМА Tot — 2063394 870255 167638] 1949489 2228873 2108164 2311752 
DHS P and Operations, 223,299 231,542 205,085 206,932 210,449 214,026 218,094 
и" Secretary 29,150 28,100 28,146 28,397 28,883 29,374 29,928 
Operating E xpenses 22,687 47,717 51,101 51,560 52,438 53,332 54,344 
DHSToa 2546 30,350 284332 = 286889 29,770 296732 302,366 
DO] Construction 105095 78982 78982 80326 81693 83081 84,577 
“Salaries and Expenses, DEA 1358 1364 1413 14362 14605 1481 15118 
Salaries and Expenses, ЕВ! 2,859,656 2,918,166 2,926,853 2,973,857 3,021,655 3,070,260 3,122,601 
DOJ Total 29839 3010795 3019958 3,068,545 3117953 3168192 3,222,296 
DoD-FCIP BRAC DAMA na n L ССС 
ПОЕМА 9974 91616 110358 095410 98543 101470 102,431 
O&M, AF 120,818 101244 95,040 84,986 88,193 91,329 92117 
O&M,DW 159,996 170,114 179,886 151,252 156,524 164,933 165,868 
O&M, MC 507 1,632 4,329 4,857 5,437 5,224 5,347 
O&M,N 124,419 120,674 129,494 123,291 127,003 130,399 131,587 
OP, A 413 423 434 441 449 457 466 
OP,N = = 1,001 = = = = 
P, MC = E 1,201 800 800 1,500 816 
RDT&E, AF 2,109 2,149 2,185 2,221 2,258 2,296 2,342 
RDT&E, DW 11,993 12,043 5,032 4,998 4,947 3,299 3,945 
tel aa 517,720 505,895 528,960 468,256 484,154 501,616 504,919 
Energy Other Defense Activities — 163,700 186,699 188619 188,619 188619 188619 188,619 
EnergyTotal — 163700 186699 188619 188619 188,619 188619 188619 


144 TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 5 (continued) (Dollars in Thousands) 
National Intelligence Program 

Budget Authority by Program and Appropriation 

FY 2011- ҒҮ 2017 

This Exhibit is SEC RET//NOFORN 


Program Appropriation FY 2011 FY 2012 FY 2013! FY 2014 FY 2015 FY 2016 FY 2017 
GDIP  — APAFE 1299 — 1650 2014 16921 1743 1208 0,303 
——— BRAC 502 a Ge eee Ge 
Fam Hsg O&M, DW 38,548 39,251 39,993 40,628 41,318 42,020 42,872 
MilCon, AF 78,851 79,000 - - - - - 
MilCon, DW 2,994 30,584 2,919 - - - - 
O&M,A 260,679 259,869 218,177 200,632 192,443 195,603 198,911 
O&M,AF 514,077 549,487 525,873 529,506 602,706 619,833 633,745 
O&M,DW 3,090,315 3,109,351 2,976,404 2,281,670 2,329,035 2,365,332 2,403,146 
O&M,MC - 38,561 35,658 33,738 33,046 33,542 34,062 
O&M,N 406,086 352,233 338,887 345,820 348,602 354,775 360,840 
ОР,А 2,908 2,975 1270 1291 1313 1,341 1368 
ОР,АҒ 60,555 29,415 24,573 41,394 56,888 67,947 61,414 
ОР,М 21,608 14,402 12,062 10,108 10,132 10,243 10,466 
P,DW 46,072 39,035 24,991 37,258 24,771 20,846 21,20 
Р,МС - - 479 446 410 415 423 
RDT&E,A 3,928 4,023 4,099 4,163 4,235 4,306 4,393 
RDT&E,AF 41,914 56,787 46,387 52,482 43,036 30,531 29,839 
RDT&E,DW 120,085 121,636 107,383 96,022 95,992 96,345 96,701 
RDT&E,N 60,458 72,472 50,823 51,131 53,612 54,211 55,342 
GDIPTotal 4767009 4815583 4430142 3,743,280 3,855,000 3,909,308 3,963,945 
NGP BRAC 15259 э -— = >  -—  — 
^ — — MiConDW | |  - 6388 -— №54 
O&M,A 47,306 50,437 46,792 51,12 52,464 51,053 50,624 
O&M,AF 72,629 82,585 82,508 82,706 82,247 78,570 74,225 
O&M,DW 3,786,519 3,765,161 3,622,550 3,079,112 3,174,373 3,165,183 3,264,611 
O&M,MC 1,859 4,720 6,976 7,441 7,901 7,281 7,336 
O&M,N 8,141 8,280 7,601 8,059 8,535 8,413 8,567 
ОР,А - 1,670 1731 1,822 1,948 2,088 2,130 
P,DW 271,191 188,749 194,051 199,672 228,300 212,839 146,748 
P,MC - 1,606 610 3,208 1292 901 908 
RDT&E,A 496 513 529 543 560 560 571 
RDT&E,AF 28,911 30,345 31,875 28,684 29,483 18,364 13,389 
RDT&E,DW 876,100 841,328 883,191 809,324 907,295 931,652 768,304 
RDT&E,N 496 506 516 523 531 531 542 
NGPToal 5221,95 504,569 4878930 — 4272206 — 4494929 — 4537435 4,603,459 
NRP A MsP,AF | 805106 768980 1097483 1378812 1,908564 1,662,508 1438311 
| МАЕ 52831 4929: 51086 — 59253 6,019 6283 65,625 
O&M,N 20,757 27,012 22,943 23,821 24,536 25,272 26,420 
ОР,АҒ 2,279,991 2,338,408 2,269,031 2,299,888 2,491,919 2,630,320 2,719,955 
RDT&E,AF 8,243,060 7,221,206 6,875,380 6,568,544 6,511,225 7,018,456 7,543,653 
NRPTotal  — 1140,74 1041335 10321923 10330322 10997263 11399388 11793964 
SRP RDT&EN = 1466792 1261731 1133604 11372278 1218707 1248078 1,273,255 
SRPTotl 1466792 1261731 113300 11372278 1218707 1248078 1273255 


TOP SECRET//SI/TK//NOFORN 145 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 5 (continued) (Dollars in Thousands) 
National Intelligence Program 

Budget Authority by Program and Appropriation 

FY 2011- ҒҮ 2017 

This Exhibit is SECRET//NOFORN 


Program Appropriation FY 2011 FY 2012 FY 2013! FY 2014 FY 2015 FY 2016 FY 2017 
Diplomatic and Consular 


State 68,773 68,203 72,655 73,981 75,373 76,798 78,249 
Programs 

State T otal 68,773 68,203 72,655 73,981 75,373 76,198 78,249 

Treasury Salaries and Expênsês, 27,422 27,23 27,297 27,474 27,652 27,832 28,019 
Treasury 

Treasury 27,422 27,123 27,297 27,474 27,652 27,832 28,019 

Total 

National Intelligence Program T otal 54,639,507 53,873,203 52,554,597 48,458,951 49,557,642 50,490,813 51,550,962 


1Еу 2013 - FY 2017 Total includes the ОСО only for FY 2013. 


146 ТОР SECRET//SI/TK//NOFORN 


Resource E xhibit No. 7B 
National Intelligence Program 

Comparison of FY 2012 Total and FY 2013 Total Request by Program 
This Exhibit is SECRET//NOFORN 


Program 

Defense Appropriations 
CCP 

CIAP 

CIARDS 

CMA 

DoD-FCIP 

GDIP 

NGP 

NRP 

SRP 

Defense Appropriations T otal 


Non-Defense A ppropriations 
DHS 

00) 

Energy 

State 

Treasury 


Non-Defense A ppropriations T otal 


National Intelligence Program 
Total 


TOP SECRET//SI/TK//NOFORN 


FY 2012 
Total 


10,514,035 
15,332,901 
513,700 
1,870,255 
505,895 
4,815,583 
5,041,569 
10,411,335 
1,267,751 
50,273,024 


307,359 
3,010,795 
186,699 
68,203 
27,123 
3,600,179 


53,873,203 


ТОР SECRET//SI/TK//NOFORN 


ЕҮ 2013 
Base 
Request 


10,036,851 
12,037,708 
514,000 
1,676,387 
456,475 
3,655,662 
4,339,195 
10,268,773 
1,099,820 
44,084,871 


284,332 
3,019,958 
188,619 
72,655 
27,297 
3,592,861 


47,677,732 


ҒҮ 2013 
oco 
Request 


730,914 
2,672,317 


72,485 
774,480 
539,735 

53,150 

33,784 

4,876,865 


4,876,865 


(Dollars in Thousands) 


FY 2013 
Total 
Request 


10,767,765 
14,710,025 
514,000 
1,676,387 
528,960 
4,430,142 
4,878,930 
10,321,923 
1,133,604 
48,961,736 


284,332 
3,019,958 
188,619 
72,655 
27,297 
3,592,861 


52,554,597 


FY 2012 Total 
Compared to 
FY 2013 Total 
Request 


253,730 
-622,876 
300 
-193,868 
23,065 
-385,441 
-162,639 
-89,412 
-134,147 
-1,311,288 


-23,027 
9,163 
1,920 
4,452 

174 
-7,318 


-1,318,606 


151 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 9 (Dollars in Thousands) 
National Intelligence Program 
Estimated Funding for Counterterrorism 
FY 2011- ҒҮ 2013 
This Exhibit is SECRET//NOFORN 
FY 2012 - FY 2013 Change 


FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 
Program Actual Enacted Base oco Request Funds Percent 
САР — — 61796553 1073722 — 4473356 — 2205992 — 66793448 39434 56 
CMA 121508 1175488 103794 —  — 10794 A454 0 
DHS... 183033 1547  - 164070 в (0 
DO | 4,372,785 137838 136791 -— 138679 843 1 
GDIP — — 1344200 12540 599789 408440 — 100829 242223 — 19 


154 TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 10 (Dollars in Thousands) 
National Intelligence Program 
Estimated Funding for Counterproliferation 
FY 2011- ҒҮ 2013 
This Exhibit is SECRET//NOFORN 
FY 2012 - FY 2013 Change 


FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 
Program Actual Enacted Base oco Request Funds Percent 
САР О 1932216 2084133 2065665 6060 207134 12339 1 
CMA 27218 21998 17767 м 321 46 
DHS | 219 2250 -— 2235 оов 3 
DO 38871 3334 3303 — -— 3303 31 0 
GDIP 63450 651600 — 45913 60816 519955  -13163 20 
Counterproliferation Total — 7,007,347 6,882010 6596737 88387 66851244 1968866 3 


TOP SECRET//SI/TK//NOFORN 155 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 11 (Dollars in Thousands) 
National Intelligence Program 
Estimated Funding for H omeland Security With Related WM p! 
FY 2011- ҒҮ 2013 
This Exhibit is SECRET//NOFORN 
FY 2012- FY 2013 Change 


FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 
Description Program Actual Enacted Base oco Request Funds Percent 
CIAP 36,492 39,314 39,625 — 39,625 311 1 
СМА 335,798 301,108 325,186 - 325,186 24,078 8 
DHS 212,186 300,624 273,758 — 273,758 -26,866 -9 
DoD-FCIP 14,867 14,765 14,553 - 14,553 -212 -1 
Doj 2,592,144 2,807,474 2,831,971 - 2,831,971 24,497 1 
Energy 73,158 73,853 73,795 - 13,795 -58 0 
GDIP 22,841 6,752 6,719 — 6,719 -33 0 
NGP 170,837 165,759 121,244 — 121,244 -44,515 -27 
NRP 7,545 7,001 6,070 — 6,070 -931 -13 
SRP 25,949 20,826 18,799 — 18,799 -2,027 -10 
State 401 401 406 - 406 5 1 
Treasury 27,422 27,123 27,296 - 27,296 173 1 
Homeland Security Total 3937,844 4147225 413377 1154 41341 54 41 
TT Security - Related DHS 5 689 691 _ 691 2 0 
DoJ 76,318 76,556 76,970 E 76,970 414 1 
Energy 18,895 17,579 17,579 — 17,579 - = 
PM eve 95,213 94,824 95,240 = 95,240 416 1 
NIP Homeland Security with Related 4,033,057 — 4,242,049 4228957 174 4230711 -11,338 E 


Weapons of Mass Destruction T otal 


1D efinition of Homeland Security from OM B Circular A -11. 


156 TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 12 (Dollars in Thousands) 
National Intelligence Program 
Estimated Funding for Counternarcotics 
FY 2011- ҒҮ 2013 
This Exhibit is SECRET//NOFORN 
FY 2012 - FY 2013 Change 


FY 2011 FY 2012 FY 2013 FY 2013 FY 2013 
Program Actual Enacted Base oco Request Funds Percent 


САР — 519033 57439 4845 20 4667 2725 20 
CMA MS 118 м —  - 4415 2⁄3 46 
DO 1358 D пыз - 102 46 3 
GDP — 2 ж 934A  - 9 6 4 
NRP —— 30532 26260] 2532 50 259982  -535 2 
State — 75 70 70 | - 170 239 3 
Treasury 39 3100 32  - 3s d 7 
CounternarcoticsTotal 1,408,700 — 1462376 1,245,320 780 124600 -116276 59 


TOP SECRET//SI/TK//NOFORN 157 


Resource E xhibit No. 13 
National Intelligence Program 
Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 

This Exhibit is SEC RET//NOFORN 


Program 
CCP 


158 


Expenditure C enter 
Analysis 


Analysis T otal 


Analysis Enabling 


Analysis E nabling T otal 
Computer N etwork Operations 


Computer Network Operations T otal 


Cryptanalysis & Exploitation Services 


Cryptanalysis & Exploitation Services 


Total 
Enterprise IT Systems 


Enterprise ІТ Systems Т otal 
Enterprise M anagement 


TOP SECRET//SI/TK//NOFORN 


(Dollars in Thousands) 


FY 2012- 

FY 2013 

Project FY 2011 FY 2012 FY 2013 Change 
Analytic Integrity & Standards 32,962 34,635 39,752 5,117 
Cyber 164,090 145,981 138,639 -7,342 
Military Forces & W eapons A nalysis 98,983 92,199 80,817 -11,382 
Regional 191,839 221,812 207,302 -20,510 
Transnational 159,521 160,573 188,132 21,559 
647,395 661,200 654,642 -6,558 

Analytic Operational Support 171,484 175,530 179,561 4,031 
Analytics М odernization 423,831 512,479 427,449 -85,030 
Linguists/T ransl ators 228,123 226,820 217,504 -9,316 
823,438 914,829 824,514 -90,315 

Data A cquisition and Cover Support 56,949 100,987 117,605 16,618 
GENIE 615,177 636,175 651,743 15,568 
SIGINT Enabling 298,613 275,376 254,943 -20,433 
970,739 1,012,538 1,024,291 11,753 

Analysis of Target Systems 39,429 35,128 34,321 -807 
Cryptanalytic ІТ Systems 130,012 136,797 247121 110,324 
Cyber Cryptanalysis 181,834 110,673 115,300 4,627 
Exploitation Solutions 90,024 59,915 58,308 -1,607 
M icroelectronics 64,603 61,672 45,886 -15,786 
PEO Program 37,683 65,892 47,185 -18,707 
PEO Program B 132,500 39471 18,000 -21471 
PEO Program C 83,599 242,945 360,898 117,953 
Target Pursuit 15,686 70,144 76,168 6,024 
Target Reconnaissance & Survey 77,668 74,513 — -74,513 
913,038 897,150 1,003,187 106,037 

Connectivity 407,592 366,995 363,554 -3,441 
4... SENG 157,110 237,420 225,780 -11,862 
Enterprise A rchitecture & Planning 18,233 11,801 16,467 4,666 
Information A ssurance 141,190 174,659 139,893 -34,766 
M anagement & Support 79,199 92,200 93,395 1,195 
Platforms 713,633 729,336 750,215 20,879 
1,577,557 1,612,633 1,589,304 -23,329 

Acquisition M anagement 111,495 110,325 116,699 6,374 
СООР 6,702 6,633 7,015 382 
Corporate Support - 60,599 65,515 4,916 
Education & Training 227,968 244,249 232,999 -11,250 
Entitlements Reimbursement 2,089 1,805 1,805 — 
Finance 108,355 95,415 110,879 15,464 
Foreign Relations & Liaison 23,312 24,328 20,868 -3,460 
HQ Management 139,033 111,151 115,822 4,671 
Human Resources 128,380 125,757 127,313 1,556 
Military HQ M anagement 74,349 73,346 69,982 -3,364 


TOP SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 13 (continued) 
National Intelligence Program 

Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 

This Exhibit is SEC RET//NOFORN 


Program Expenditure C enter Project 

Security 
Systems Engineering: SIGINT 

Enterprise M anagement T otal 

Facilities & Logistics Facilities 
Logistics 

Facilities & Logistics T otal 

Mid Point RF Access FORNSAT 
Quick Reaction Capabilities 
RF Operations 
Tailored RF Solutions 
Terrestrial Collection 

Mid Point RF Access Total 

Mission M anagement / T asking Collection M anagement 
Customer Service 
Foreign Partner Operations 
Journeyman 
M ission M anagement M odernization 

Mission M anagement / T asking T otal 

Mission Processing & Exploitation ELINT M odernization 
FISINT M odernization 
Net-centric Capabilities 


Mission Processing & E xploitation 
Total 


Computer & Information Science 
Research 


Coping with Information Overload 
Cryptologic M ath & IDA Research 
Human Language T echnology Research 
Improving Research Operations 
Owning the Net 

Penetrating Hard Targets 

Ubiquitous Secure Collaboration 


Research & Technology 


Research & Technology T otal 


Sensitive T echnical Collection CLANSIG 
SCS 
Sensitive T echnical Collection T otal 
SIGINT Stations Cryptologic Centers 
Field Sites 
OCMC 


SIGINT Ground Operations 
SIGINT Stations T otal 
Special Source A ccess Corporate Partner A ccess 
Foreign Partner A ccess 


TOP SECRET//SI/TK//NOFORN 


FY 2011 
255,787 
97,938 
1,175,408 
1,490,711 
105,409 
1,596,120 
136,710 
40,136 
103,985 
90,978 
371,809 
76,193 
149,188 
74,146 
13,357 
29,139 
342,623 
75,999 
9,725 
292,217 


377,941 


20,777 


39,046 
146,432 
26,361 
37,181 
66,933 
62,783 
14,651 
414,164 
346,961 
269,708 
616,669 
29,299 
191,128 
6,166 
71,912 
298,505 
393,667 
90,979 


(Dollars in Thousands) 


FY 2012 
266,175 
110,075 

1,229,858 
1,199,825 
107,464 
1,307,289 
108,385 
45,957 
65,538 
84,302 
304,182 
113,924 
173,186 
71,642 
13,206 
22,220 
394,178 
40,923 
34,196 
281,552 


356,671 


44,254 


64,332 
128,511 
34,030 
30,503 
61,167 
55,347 
25,762 
443,906 
325,506 
245,829 
571,335 
30,602 
184,643 
6,416 
62,008 
283,669 
310,234 
75,108 


FY 2013 
269,790 
85,984 
1,224,671 
1,514,217 
102,501 
1,616,718 
81,330 
98,922 
131,276 
69,090 
380,618 
125,896 
158,473 
67,287 
12,986 
22,333 
386,975 
55,706 
29,510 
219,583 


304,799 


29,579 


48,612 
119,300 
29,357 
31,195 
67,589 
79,740 
23,741 
429,113 
348,196 
249,088 
597,284 
24,588 
185,917 
7,165 
50,519 
268,189 
278,131 
56,593 


FY 2012 - 
ЕУ 2013 
Change 


3,615 
-24,091 
-5,187 
314,392 
-4,963 
309,429 
-27,055 
-45,957 
33,384 
131,276 
-15,212 
76,436 
11,972 
-14,713 
-4,355 
-220 
113 
-7,203 
14,783 
-4,686 
-61,969 


-51,872 


-14,675 


-15,720 
-9,211 
-4,673 

692 
6,422 
24,393 
-2,021 

-14,793 

22,690 

3,259 
25,949 
-6,014 
1274 
749 

-11,489 

-15,480 

-32,103 

-18,515 


159 


Resource E xhibit No. 13 (continued) 


National Intelligence Program 
Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 

This Exhibit is SEC RET//NOFORN 


Program 


CCP Total 
CIAP 


160 


Expenditure C enter 


Special Source Access T otal 


Analysis 


Analysis T otal 
Analysis Enabling 


Analysis E nabling T otal 
Computer N etwork Operations 


Computer Network Operations T otal 


Counterintelligence 


Counterintelligence T otal 
Covert Action 


Covert Action Total 
Enterprise ІТ Systems 


Enterprise ІТ Systems T otal 
Enterprise M anagement 


Enterprise M anagement T otal 


TOP SECRET//SI/TK//NOFORN 


Project 
National Program 
Special Source Operations 


Analytic Integrity & Standards 
CI 

Regional 

Transnational 


Education & Training 
Mission IT 

M ission Support 

Production and Dissemination 


Education & Training 
Information Operations 
Mission IT 


CI Operations 

Education & Training 

Mission Activities and Support 
Mission IT 


Covert A ction Infrastructure 
Covert A ction Programs 


Connectivity 


Data Handling & End-U ser 
Functionality 


Education & Training 


Enterprise A rchitecture & Planning 


Information A ssurance 
M anagement & Support 
Platforms 


Acquisition M anagement 
COOP 

Corporate Support 
Education & Training 
Finance 

HQ M anagement 

Human Resources 
Inspector General 
Security 


TOP SECRET//SI/TK//NOFORN 


FY 2011 
177 
125,340 
611,757 
10,737,163 
5,729 
14,301 
214,891 
456,005 
690,926 
39,333 
239,295 
81,360 
22,564 
382,552 
4,209 
637,295 
7,830 
649,334 
125,942 
4,779 
15,785 
2,178 
148,684 
600,696 
2,011,811 
2,612,507 
85,795 


35,004 


9,566 
8,252 
768 
256,750 
126,993 
523,128 
22,284 
9,401 
113,139 
104,253 
52,198 
153,774 
184,854 
242,078 
881,981 


(Dollars іп Thousands) 


FY 2012 
2,038 
137,217 
524,597 
10,514,035 
6,063 
14,515 
210,477 
456,887 
687,942 
40,797 
257,685 
91,377 
25,046 
414,905 
2,245 
652,559 
9,443 
664,247 
141,669 
5,892 
14,497 
2,189 
164,247 
542,075 
1,970,933 
2,513,008 
67,225 


56,120 


9,782 
8,619 
12,736 
219,083 
138,301 
571,866 
33,149 
8,748 
129,224 
110,671 
51,810 
115,838 
190,959 
32,716 
224,078 
897,253 


FY 2013 
2,247 
126,489 
463,460 
10,767,765 
5,872 
14,586 
209,161 
434,248 
663,867 
37,335 
252,862 
99,937 
34,488 
424,622 
2,250 
673,399 
9,726 
685,375 
140,061 
4,257 
11,784 
2,096 
158,198 
523,402 
2,036,006 
2,559,408 
70,878 


42,839 


10,267 
15,306 
6,328 
249,467 
133,940 
529,025 
26,262 
6,188 
148,737 
101,423 
57,853 
113,833 
186,051 
34,796 
224,265 
899,408 


ЕҮ 2012- 
FY 2013 
Сһапде 


209 
-10,728 
-61,137 
253,730 

-191 
71 
-1,316 
-22,639 
-24,075 
-3,462 
-4,823 
8,560 
9,442 
9,717 

5 
20,840 
283 
21,128 
-1,608 
-1,635 
-2,713 
-93 
-6,049 
-18,673 
65,073 
46,400 
3,653 


-13,281 


485 
6,687 
-6,408 
-29,616 
-4,361 
-42,841 
-6,887 
-2,560 
19,513 
-9,248 
6,043 
-2,005 
-4,908 
2,020 
187 
2,155 


Resource E xhibit No. 13 (continued) 


National Intelligence Program 
Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 

This Exhibit is SEC RET//NOFORN 


Program 


CIAP Total 
CIARDS 


Expenditure C enter 
Facilities & Logistics 


Facilities & Logistics T otal 
HUMINT Enabling 


HUMINT Enabling Total 
HUMINT Operations 


HUMINT Operations T otal 
HUMINT Technical Tools 


HUMINT Technical Tools T otal 
Mission M anagement / T asking 


Mission M anagement / T asking T otal 
Open Source 


Open Source T otal 
Research & Technology 


Research & Technology T otal 
Reserve for Contingencies 
Reserve for C ontingencies T otal 
Sensitive T echnical Collection 


Sensitive T echnical C ollection T otal 


Enterprise M anagement 
Enterprise M anagement T otal 


CIARDS Total 


TOP SECRET//SI/TK//NOFORN 


Project 
Facilities 
Logistics 


Cover Services 
Education & Training 
Mission IT 

M ission Support 


H eadquarters 
Non-Traditional 
Traditional 


Education & Training 

M ission IT 

Special Activities and Platforms 
Tactical Collection 

Technical Tradecraft 


Mission IT 


National Clandestine Service 
Community 


Collection & Production 
Education & Training 
Mission IT 


Science and Research 
Strategic Technical Investment 


Reserve 


Clandestine Technical Collection 


Clandestine W eapons T echnical 
Collection 


CLANSIG 

Education & Training 

SCS 

Support to National Programs 


Human Resources 


TOP SECRET//SI/TK//NOFORN 


FY 2011 
147,049 
18,046 
165,095 
51,165 
156,778 
794,985 
1,376,353 
2,385,881 
19,268 
456,491 
1,737,389 
2,213,148 
8,488 
6,619 
373,212 
486,824 
458,790 
1,333,933 
4,646 


8,282 


12,928 
245,531 
10,921 
153,126 
409,578 
85,315 
61,862 
147,177 
15,000 
15,000 
1,208,948 


239,093 


446,216 
13,889 
95,006 
71,315 

2,080,527 
14,652,379 

292,000 

292,000 

292,000 


(Dollars in Thousands) 


FY 2012- 

FY 2013 

FY 2012 FY 2013 Change 
251,686 154231 -97,455 
18,472 17,347 -1,125 
270,158 171,578 -98,580 
67,360 68,656 1,296 
162,967 169,166 6,199 
815,727 814,815 -912 
1,527,520 1,476,607 -50,913 
2,573,574 2,529,244 -44,330 
18,918 19,119 201 
453,143 466,137 12,994 
1,815,936 1,858,423 42,487 
2,287,997 2,343,679 55,682 
10,606 11,167 561 
7,844 6,358 -1,486 
368,215 356,571 -11,644 
479,919 495,957 16,038 
500,370 543,333 42,963 
1,366,954 1,413,386 46,432 
7,938 3,531 -4,407 
9,252 1,373 -1,879 
17,190 10,904 -6,286 
260,126 253,068 -7,058 
12,678 12,652 -26 
111,136 121,627 10,491 
383,940 387,347 3,407 
87,310 76,763 -10,547 
52,640 50,198 -2,442 
139,950 126,961 -12,989 
20,000 35,000 15,000 
20,000 35,000 15,000 
1,431,227 837,755 -593,472 
247,072 266,429 19,357 
467,900 464,625 -3,275 
15,269 21,574 6,305 
121,537 105,758 -15,779 
76,665 75,882 -783 
2,359,670 1,772,023 -587,647 
15,332,901 14,710,025 -622,876 
513,700 514,000 300 
513,700 514,000 300 
513,700 514,000 300 
161 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 13 (continued) (Dollars in Thousands) 
National Intelligence Program 

Budget Authority by Program, Expenditure C enter, and Project 

FY 2011- ҒҮ 2013 

This Exhibit is SECRET//NOFORN 


FY 2012- 
FY 2013 
Program Expenditure C enter Project FY 2011 FY 2012 FY 2013 Change 
CMA Analysis IntelligenceToday _ _ 200 | - -  -— 
President's Daily Briefing Staff 7,969 8,017 8,488 471 
Analysis T otal 65,966 58,429 51,440 -6,989 
Enterprise IT Systems Chief Information Office 175,796 73,791 142,509 68,718 
Information Integration 127,906 98,281 — -98,281 
и Information Sharing 21751 23,036 25,884 2,848 
Enterprise ІТ Systems T otal 325,453 195,108 168,393 -26,715 
Enterprise M anagement Acquisition and Technology 43,888 34,385 32,212 -2,173 
Analysis 50,275 — — — 
Chief Financial Office 16,734 24,690 30,582 5,892 
Chief Human Capital Officer 54,885 35,434 — -35,434 
Collection 39,797 - - - 
COOP 70,862 72,552 57,817 -14,735 
Director of National Intelligence 105,594 65,944 39,463 -26,481 
Education & Training 84,068 89,492 E -89,492 
Human Capital and L earning - - 103,903 103,903 
Inspector General - 5,381 6,901 1,520 
Mission Support Center 241,914 310,762 241,186 -69,576 
Policy and Outreach M anagement - 17,105 22,800 5,695 
Policy Plans and Requirements 18,758 — — — 
Security 36,497 34,508 33,302 -1,206 
Systems and Resource A nalysis 26,328 26,946 28,913 1,967 
Enterprise M anagement T otal 789,600 717,199 597,079 -120,120 
Mission M anagement / T asking Community CI 56,944 61,980 46,888 -15,092 
ission M anagers 8,515 — — — 
2. Intelligence Coordination 12671 _ _ _ 
National Intelligence Integration - 95,989 85,469 -10,520 
СРС 60,627 40,606 22,461 -18,145 
CTE 316,700 368,373 371,578 3,205 
Mission M anagement / T asking T otal 515,457 566,948 526,396 -40,552 
Research & Technology 2. DAT "ih 350,978 327,349 333,079 5,730 
ational R&D Commission 2,000 - - - 
Rapid Technology Transition Initiative 13,940 5,222 — -5,222 
Research & Technology T otal 366,918 332,571 333,079 508 
МА 2,063,394 1,870255 1676387 -193868 
DHS Analysis  HomeandSeurty 223,299 2300804 19343 3174 
Analysis T otal 245,986 277,801 233,561 -44,240 
Counterintelligence DHS Counterintelligence - - 12,742 12,742 
USCG Counterintelli gence - - 9,883 9,883 
Counterintelligence Т otal - - 22,625 22,625 


162 ТОР SECRET//SI/TK//NOFORN 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 13 (continued) 
National Intelligence Program 

Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 


(Dollars in Thousands) 


This Exhibit isSECRET//NOFORN 


FY 2012 - 

FY 2013 

Program Expenditure C enter Project FY 2011 FY 2012 FY 2013 Change 
Enterprise M anagement COOP - 1458 - -1,458 

Security 29,150 28,100 28,146 46 

Enterprise M anagement T otal 29,150 29,558 28,146 -1412 

DHS Total 275,136 307,359 284,332 -23,027 
DoD-FCIP Analysis CI 34,283 37,974 38,162 188 
Analysis T otal 34,283 37,974 38,162 188 
Counterintelligence СІ Campaigns 15,625 67,937 60,750 -7,187 

СІ Operations 21,336 23,678 34,116 10,438 

Defense Cyber Crime Center 15,459 17,935 19,328 1,393 

Education & Training 39,072 37,821 36,159 -1,662 

Joint Terrorism Task Force 14,867 14,765 14,553 -212 

Mission Activities and Support 233,254 216,835 223,734 6,899 

Mission IT 38,354 37,322 36,364 -958 

Research & Technology Protection 6,424 6,454 20,513 14,059 

Counterintelligence T otal 444,391 422,747 445,517 22,770 

Enterprise ІТ Systems Platforms 12,774 15,578 16,183 605 

Enterprise ІТ Systems T otal 12,774 15,578 16,183 605 

Enterprise M anagement HQ M anagement 24,199 21,382 20,613 -769 

Human Resources 2,052 1,906 2,003 97 

Enterprise M anagement T otal 26,251 23,288 22,616 -672 

Facilities & Logistics Facilities 21 6,308 6,482 174 

Facilities & Logistics T otal 21 6,308 6,482 174 

DoD-FCIP Total 517,720 505,895 528,960 23,065 
00) Analysis Computer Intrusions 114,083 116,434 — -116,434 
Transnational 759,564 771,582 849,037 77,455 

Analysis T otal 873,647 888,016 849,037 -38,979 

Analysis Enabling Linguists/T ranslators 147,022 148,427 149,263 836 

Analysis E nabling T otal 147,022 148,427 149,263 836 
Counterintelligence CI Operations 562,345 367,383 489,821 122,438 
Counterintelligence T otal 562,345 367,383 489,821 122,438 

Enterprise IT Systems Platforms 54,670 40,960 40,034 -926 

Enterprise ІТ Systems T otal 54,670 40,960 40,034 -926 

Enterprise M anagement Education & Training 41,029 46,429 45,945 -484 

HQ Management 471,434 520,945 25,038 -495,907 

Enterprise M anagement T otal 512,463 567,374 70,983 -496,391 

Facilities & Logistics Facilities 60,311 43,480 43,256 -224 

Facilities & Logistics T otal 60,311 43,480 43,256 -224 

HUMINT Operations Traditional 471,449 663,226 919,798 256,572 

HUMINT Operations T otal 471,449 663,226 919,798 256,572 

Technical Operations Computer Intrusions - - 168,146 168,146 

Technical Services 296,422 291,929 289,620 -2,309 

Technical O perations T otal 296,422 291,929 457,766 165,837 

DOJ Total 2,978,329 3,010,795 3,019,958 9,163 
Energy Analysis Transnational 105,862 126,288 142,7 16,483 
Analysis T otal 105,862 126,288 142,771 16,483 

TOP SECRET//SI/TK/NOFORN 163 


Resource E xhibit No. 13 (continued) 


National Intelligence Program 
Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 


This Exhibit isSECRET//NOFORN 


Program 


Energy T otal 
GDIP 


164 


Expenditure C enter 
Counterintelligence 
Counterintelligence T otal 


Analysis 


Analysis T otal 
Analysis Enabling 


Analysis E nabling T otal 


Enterprise IT Systems 


Enterprise ІТ Systems T otal 
Enterprise M anagement 


Enterprise M anagement T otal 


Facilities & Logistics 


Facilities & Logistics T otal 
HUMINT Enabling 


HUMINT Enabling Total 
HUMINT Operations 


HUMINT Operations T otal 
MASINT 


TOP SECRET//SI/TK//NOFORN 


Project 
CI Operations 


Analytic Integrity & Standards 
С415К Analysis 

M edical 

Military Forces & W eapons A nalysis 
Regional 

S&T Analysis 

Transnational 

Warning 


Analytic Tools 
Education & Training 
M ission Support 


Connectivity 

Enterprise A rchitecture & Planning 
Information A ssurance 

M anagement & Support 

Platforms 


Acquisition M anagement 
COOP 

Education & Training 
Finance 

Foreign Relations & Liaison 
HQ Management 

Human Resources 

Security 


Facilities 
L ogistics 


Cover Services 
Education & Training 
Mission IT 

M ission Support 


Non-Traditional 
Special M ission Unit 
Traditional 


Close A ccess/Persistent Surveillance 
Directed Energy W eapons 


Education & Training 


TOP SECRET//SI/TK//NOFORN 


FY 2011 
57,838 
57,838 

163,700 
1,081 
98,071 
19,791 
136,704 
164,595 
303,337 
228,118 
15,319 
967,016 
86,927 
12,423 
72,624 
171,974 
253,578 
40,793 
22,943 
189,018 
458,876 
965,208 
16,755 
4,683 
62,849 
60,478 
9232 
52,128 
59,347 
86,005 
351,477 
287,110 
164,068 

451,178 
30,453 
50,450 
19,679 

258,833 
359,415 
208,226 
76,180 
109,835 
394,241 
41,265 
6,263 
1,942 


(Dollars in Thousands) 


FY 2012- 

FY 2013 

FY 2012 FY 2013 Change 
60,411 45,848 -14,563 
60,411 45,848 -14,563 
186,699 188,619 1,920 
1,592 - -1,592 
100,670 133,051 32,381 
21,689 20,218 -1471 
126,135 127,647 1512 
170,533 154,064 -16,469 
273,389 272,155 -1,234 
247,175 210,191 -36,984 
17,725 17,370 -355 
958,908 934,696 -24,212 
130,671 154,132 23,461 
14,292 19,654 5,362 
83,894 74,228 -9,666 
228,857 248,014 19,157 
246,141 212,087 -34,054 
44,046 44,594 548 
42,238 44,184 1,946 
169,135 147,293 -21,842 
428,516 385,254 -43,262 
930,076 833,412 -96,664 
18,590 18,594 4 
4,926 5,438 512 
66,190 74,278 8,088 
66,589 74,315 7,126 
10,316 - -10,316 
53,609 52,095 -1,514 
52,720 68,170 15,450 
87,659 108,791 21,132 
360,599 401,681 41,082 
311,386 181,221 -130,165 
126,974 93,699 -33,275 
438,360 274,920 -163,440 
32,460 41,932 9,472 
45,519 46,034 515 
8,490 8,936 446 
303,126 310,263 7,137 
389,595 407,165 17,570 
214,606 175,599 -39,007 
72,683 — -72,683 
114,395 129,037 14,642 
401,684 304,636 -97,048 
42,523 31,961 -10,562 
6,369 6,417 48 
1,996 2,035 39 


Resource E xhibit No. 13 (continued) 


National Intelligence Program 
Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 

This Exhibit is SEC RET//NOFORN 


Program 


GDIP Total 
NGP 


Expenditure C enter 


MASINT Total 
Mission M anagement / T asking 


Mission M anagement / T asking T otal 


Open Source 


Open Source T otal 
Research & Technology 


Research & Technology T otal 
Sensitive T echnical Collection 
Sensitive T echnical C ollection T otal 


Analysis 


Analysis T otal 
Commercial Remote Sensing 


Commercial R emote Sensing T otal 
Enterprise IT Systems 


Enterprise ІТ Systems T otal 
Enterprise M anagement 


TOP SECRET//SI/TK//NOFORN 


Project 

Missiles 

Mission IT 

Mission Support 

National Signatures Program 
WMD 


Collection M anagement 
Foreign Relations & Liaison 
ission M anagement C enters 


edia Exploitation and Open Source 
ission IT 


Analysis Development 
T Technology Insertion 


ASINT Technology Development & 
Demonstration 


aritime Surveillance 


AGI Analysis 

Analytic Integrity & Standards 
Deployed Operations 
Homeland Security 


Integrated O perations Center - Special 
Projects (IOC-SP) 


International Operations 
Regional 

Transnational 

Warning 


M ission Support 
Purchases 


Connectivity 


Data Handling & End-U ser 
Functionality 


Information A ssurance 
M anagement & Support 
Platforms 

Systems M aintenance 


Acquisition M anagement 


COOP 
Education & Training 


TOP SECRET//SI/TK//NOFORN 


FY 2011 
201,268 
6,930 
37,654 
10,930 
268,164 
574,416 
34,115 
31,466 
66,241 
238,768 
13,611 
252,379 
6,840 
28,951 


90,292 


126,083 
87,381 
87,381 

4,767,009 
115,731 
601 
75,611 
41,060 


81,502 


31,291 
331,943 
328,597 

42,909 

1,115,245 

15,956 
220,718 
236,674 
164,499 


212,535 


46,490 
50,594 
49,728 
374,975 
898,821 
42,003 
7,166 
88,052 


(Dollars in Thousands) 


FY 2012- 

FY 2013 

FY 2012 FY 2013 Change 
224,609 171,822 -52,787 
6,905 8,712 1,807 
47,113 38,208 -8,905 
6,463 1,270 -5,193 
285,611 275,425 -10,186 
621,589 535,850 -85,739 
49,873 63,573 13,700 
- 10,147 10,147 
49,873 73,720 23,847 
212,548 210,685 -1,863 
17,604 16,893 -711 
230,152 227,578 -2,574 
5,904 4,659 -1,245 
21,909 12,372 -9,537 
87,441 83,260 -4,181 
115,254 100,291 -14,963 
90,636 88,179 -2,457 
90,636 88,179 -2,457 
4,815,583 4,430,142 -385,441 
178,199 172,741 -5,458 
554 580 26 
88,723 101,935 13,212 
47,139 16,439 -30,700 
83,464 86,180 2,716 
40,677 - -40,677 
336,689 269,649 -67,040 
318,580 287,344 -31,236 
42,310 37,887 -4,423 
1,136,335 972,755 -163,580 
15,251 - -15,251 
205,670 - -205,670 
220,921 - -220,921 
179,223 184,835 5,612 
213,359 186,702 -26,657 
46,375 42,365 -4,010 
85,521 94,056 8,535 
66,141 78,485 12,344 
454,458 429,214 -25,244 
1,045,077 1,015,657 -29,420 
39,937 38,142 -1,795 
6,062 6,053 -9 
15,835 78,985 3,150 
165 


Resource E xhibit No. 13 (continued) 


National Intelligence Program 
Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 

This Exhibit is SEC RET//NOFORN 


Program 


NGP Total 
NRP 


166 


Expenditure C enter 


Enterprise M anagement T otal 
Facilities & Logistics 


Facilities & Logistics T otal 
GEOINT Data 


GEOINT Data Total 
Mission M anagement / T asking 


Mission M anagement / T asking T otal 


Mission Processing & Exploitation 


Mission Processing & E xploitation 
Total 


Research & Technology 


Research & Technology T otal 


Enterprise IT Systems 


Enterprise ІТ Systems Т otal 
Enterprise M anagement 


TOP SECRET//SI/TK//NOFORN 


Project 

Finance 

GEOINT Functional M anagement 
HQ M anagement 

Human Resources 

Security 


Facilities 
Logistics 


Commercial Imagery 
Source Assessment & ERM 


GEOINT Functional M anagement 
International Operations 

M ission Readiness 

Source A ssessment & ERM 


Source Tasking Operations & 
M anagement 


Compartmented GEOINT Enterprise 
Services (CGES) 


NSG Enterprise M odernization 

NSG Integrated A rchitecture Services 
NSG Operational Systems 

NSG Sensor Integration 

NSG Systems Engineering 

STIL 


Advanced Radar GEOINT 


GEOINT Advanced Technology 
Development 


GEOINT Basic & Applied Research 


GEOINT Research and Technology 
Enablers 


Connectivity 
Enterprise Architecture & Planning 
Information A ssurance 


Acquisition M anagement 
COOP 

Education & Training 
Finance 

HQ Management 

Human Resources 


TOP SECRET//SI/TK//NOFORN 


FY 2011 
44,988 
24,074 
54,788 
46,966 

143,161 

451,198 

516,506 
2,632 
519,138 


17,227 
364,828 


117,364 
499,419 
69,539 


261,759 
119,781 
446,191 
146,665 
220,717 

22,817 


1,287,469 
7,105 
85,550 
70,631 
56,695 


219,981 
5,227,945 
545,666 
22,710 
18,118 
586,494 
38,641 
7,545 
2,612 
18,202 
46,261 
219,727 


(Dollars in Thousands) 


FY 2012 - 

FY 2013 

FY 2012 FY 2013 Change 
61,809 50,159 -11,650 
21,841 - -21,841 
45,778 48,032 2,254 
41,118 43,340 2,222 
123,726 147,391 23,665 
416,106 412,102 -4,004 
219,792 112,716 -107,076 
2,902 2,754 -148 
222,694 115,470 -107,224 
- 189,744 189,744 

- 347,335 347,335 

- 537,079 537,079 

- 23,406 23,406 

- 37,657 37,657 
15,348 11,107 -4,241 
330,725 - -330,725 
148,201 120,802 -27,399 
494,274 192,972 -301,302 
92,148 68,499 -23,649 
202,416 218,695 16,279 
185,238 213,519 28,281 
415,591 516,352 100,761 
138,948 133,328 -5,620 
215,872 222,910 7,038 
34,484 42,648 8,164 
1,284,697 1,415,951 131,254 
93,341 94,405 1,064 
74,867 70,591 -4,276 
53,257 51,948 -1,309 
221,465 216,944 -4,521 
5,041,569 4,878,930 -162,639 
456,333 486,588 30,255 
36,653 36,215 -438 
18,042 13,264 -4,778 
511,028 536,067 25,039 
28,831 26,114 -2,717 
7,001 6,070 -931 
1,646 1,524 -122 
18,648 19,794 1,146 
42,834 37,043 -5,791 
226,992 233,560 6,568 


Resource E xhibit No. 13 (continued) 


National Intelligence Program 
Budget Authority by Program, Expenditure C enter, and Project 
ЕУ 2011- FY 2013 

This Exhibit is SEC RET//NOFORN 


Program 


Expenditure C enter 


Enterprise M anagement T otal 
Facilities & Logistics 


Facilities & Logistics T otal 
GEOINT EO 


GEOINT EO Total 
GEOINT Radar 


GEOINT Radar T otal 


GEOINT/SIGINT Integrated 
Ground Development Engineering & 
M anagement 


GEOINT/SIGINT Integrated 
Ground Development E ngineering & 
Management T otal 


Launch 


Launch T otal 
Mission Ground Stations 


Mission Ground Stations T otal 
Research & Technology 


Research & Technology T otal 
Sensitive T echnical Collection 
Sensitive T echnical C ollection T otal 
SIGINT High 


TOP SECRET//SI/TK//NOFORN 


Project 

NRO Mission Support 
Security 

Spectrum M anagement 
Systems Engineering 


Facilities 
Logistics 


Enhanced Imagery System 
EO Integration & Support 
Evolved Enhanced CRY STAL System 


GEOINT Radar Sustainment 
Radar Integration & Support 
TOPAZ (1-5) 

TOPAZ Block 2 


Command & Control 


Ground Integration & Support 
Mission Control 

M ission Framework 

M ission M anagement 

M ission Processing 


Launch Capability Infrastructure 
Launch Operations & Engineering 
Launch V ehicles 


CONUS Operations 
OCONUS Operations 
Station Integration & Support 


Research & Technology Development 
Research & Technology Support 


NRO Compartmented Programs 


High Altitude Integration & Support 
NEMESIS 2 

ORION 7 

ORION 8 

RAVEN 5/6 


TOP SECRET//SI/TK//NOFORN 


FY 2011 
60,739 
81,499 

7,931 
131,492 
614,649 

98,964 
49,840 
148,804 
1,527,603 
45,094 


1,572,697 
82,493 
594,020 


676,513 


246,469 


212,455 
268,307 
175,776 
648,756 


1,551,763 


282,051 
288,344 
330,092 
900,487 
792,345 
271,709 
42,288 
1,106,342 
352,634 
11,333 
363,967 
653,027 
653,027 
127,402 
502,433 
9,130 
182,277 


(Dollars in Thousands) 


FY 2012 
45,050 
94,393 

7,922 
153,980 
627,297 
169,761 

46,229 
215,990 
225,101 
30,478 
1,246,345 
1,501,924 
10,000 
123,264 
429,823 


563,087 


179,965 


204,316 
351,013 
149,761 
559,002 


1,444,057 


269,500 
303,301 
377,771 
950,572 
804,687 
280,233 
41,121 
1,126,041 
353,665 
7,365 
361,030 
750,955 
750,955 
126,674 


130,383 


FY 2013 
88,312 
86,481 

8,280 
137,970 
645,148 
165,382 

54,476 
219,858 
186,701 
91,235 
1,549,148 
1,827,084 
85,785 
67,686 
124,789 
278,260 


54,850 


183,199 
362,173 
198,814 

35,913 
638,850 


1,473,799 


286,000 
295,414 
679,073 
1,260,487 
700,673 
276,593 
31,684 
1,008,950 
391,110 
10,250 
401,360 
482,027 
482,027 
105,152 


37,967 


FY 2012 - 
ЕУ 2013 
Сһапде 


43,262 
-7,912 
358 
-16,010 
17,851 
-4,379 
8,247 
3,868 
-38,400 
60,757 
302,803 
325,160 
-10,000 
-37,479 
-362,137 
124,789 
-284,827 


-125,115 


-21,117 
362,173 
-152,199 
-113,848 
79,848 


29,742 


16,500 
-7,887 
301,302 
309,915 
-104,014 
-3,640 
-9,437 
-117,091 
37,445 
2,885 
40,330 
-268,928 
-268,928 
-21,522 


-92,416 


167 


Resource E xhibit No. 13 (continued) 


National Intelligence Program 
Budget Authority by Program, Expenditure C enter, and Project 
FY 2011- ҒҮ 2013 

This Exhibit is SECRET//NOFORN 


Program 


NRP Total 
SRP 


SRP Total 
State 


State T otal 
Treasury 


168 


Expenditure C enter 


SIGINT High Total 
SIGINT Low 


SIGINT Low Total 
Space Communications 


Space Communications T otal 


Enterprise M anagement 


Enterprise M anagement T otal 
Research & Technology 
Research & Technology T otal 
Sensitive T echnical Collection 


Sensitive T echnical Collection T otal 
Special Source A ccess 


Special Source Access T otal 


Analysis 


Analysis T otal 

Analysis Enabling 

Analysis E nabling T otal 
Enterprise ІТ Systems 
Enterprise ІТ Systems T otal 


Analysis 
Analysis T otal 


TOP SECRET//SI/TK//NOFORN 


Project 


SIGINT High Altitude В eplenishment 
Program (SHARP) 


INTRUDER 11/12 

INTRUDER 5/6 

INTRUDER 7/8 

Low Altitude Integration & Support 


Mission System Encryption 
QUASAR R/S - 17/18 
QUASAR R/S - 19 
QUASAR R/S 20/21 
QUASAR R/S 22/23 

Relay Readiness and Launch 


Space Communications Integration & 
Support 


Space Operations Development 
Segment 


(Project P_ MA) 
COOP 


(Project P_APP) 


Project P_GBG) 
Project P_O_ST) 
Project P_RUSH) 
Project P_SRC) 


Project P_AC) 

Project P_CCBS) 
Project P_O_SA) 
Project P_SCOL) 


Analytic Integrity & Standards 
Transnational 


Mission Support 


M anagement & Support 


Transnational 


TOP SECRET//SI/TK//NOFORN 


FY 2011 
948,443 


1,769,685 
231,484 
489,969 
122,197 
843,650 

26,425 
26,143 
7,223 
252,337 


80,264 


91,351 


129,924 


613,667 
11,401,745 
31,955 
3441 
35,396 
81,255 
81,255 
109,463 
95,625 
198,086 
129,486 
532,660 
424,291 
24,978 
51,727 
316,485 
817,481 
1,466,792 
143 
44,715 
44,858 
13,299 
13,299 
10,616 
10,616 
68,773 
22,568 
22,568 


(Dollars in Thousands) 


FY 2012 
832,977 


1,090,034 
112,570 
439,948 
113,563 
666,081 

29,174 


263,603 
21,573 
42,216 


78,791 


161,882 


603,239 
10,411,335 
28,326 
500 
28,826 
65,330 
65,330 
123,712 
107,695 
195,263 
90,695 
517,365 
329,096 
48,480 
218,654 
656,230 
1,267,751 
143 
44,552 
44,695 
13,241 
13,241 
10,267 
10,267 
68,203 
22,569 
22,569 


FY 2013 
784,338 


927,457 


323,427 
122,932 
446,359 

30,073 


435,300 
80,781 
16,919 


99,914 


152,080 


815,067 
10,321,923 
28,682 
500 
29,182 
56,377 
56,377 
119,918 
103,258 
197,312 
90,159 
510,647 
239,779 
49,357 
248,262 
537,398 
1,133,604 
144 
44,968 
45,112 
13,930 
13,930 
13,613 
13,613 
72,655 
22,143 
22,743 


FY 2012- 
FY 2013 
Change 


-48,639 


-162,577 
-112,570 
-116,521 
9,369 
-219,722 
899 


171,697 
53,208 
-25,297 


21,123 


-9,802 


211,828 
-89,412 
356 


877 
-30,392 
-118,832 
-134,147 
1 

416 

417 

689 

689 
3,346 
3,346 
4,452 
174 

174 


TOP SECRET//SI/TK//NOFORN 


Resource E xhibit No. 13 (continued) 

National Intelligence Program 

Budget Authority by Program, Expenditure C enter, and Project 
FY 2011- ҒҮ 2013 


(Dollars in Thousands) 


This Exhibit is SECRET//NOFORN 


FY 2011 


FY 2012 


FY 2013 


FY 2012- 
FY 2013 


Program Expenditure C enter Project 


Enterprise IT Systems Platforms 


Enterprise ІТ Systems T otal 


Treasury T otal 


4,854 
4,854 
27,422 


4,554 
4,554 
27,123 


4,554 
4,554 
27,297 


Сһапде 


174 


National Intelligence Program Т otal 


TOP SECRET//SI/TK//NOFORN 


54,639,507 


53,873,203 


52,554,597 


-1,318,606 


169 


«See rs. 


354 / 569 338 / 340 354 / 570 


539 / 569 


21 Bokstaveringsalfabetet (Svenska) 


Adam 
Bertil 
Cesar 
David 
Erik 
Filip 
Gustav 
Helge 
Туаг 
Johan 
Kalle 
Ludvig 
Martin 
Niklas 


Q: >: > N < x Z < C —= Q mx O — O 


Olof 
Petter 
Qvintus 
Rudolf 
Sigurd 
Tore 
Urban 
Viktor 
Wilhelm 
Xerxes 
Yngve 
Zata 
Ake 
Arlig 


сюжасолвов н 


+ 


Ен 
Туда 
Тгеа 
Еуга 
Femma 
Sexa 
Sju 

Ана 
Міа 
Nolla 
Punkt 
Komma 
Minus 
Plus 
Mellanslag 


Tabell 4: Svenska bokstaveringsalfabetet 


2.2 Bokstaveringsalfabetet (Internationella) 


OzgrmR——-unOonumogouvo» 


мехк<сяаояоот 


Рара 


Quebec 
Romeo 
Sierra 
Tango 
Uniform 
Victor 
Whiskey 
X-ray 
Yankee 
Zulu 
Alfa-Alfa 
Alfa-Echo 
Oscar-Echo 


ج س یم یں ج ی с мч с‏ © 


den 22 december 2020 13:41:53 - rhb-full-v2.0.2.pdf 


539 / 570 


SECUR 


355 / 569 339 / 340 355 / 570 


b І AN Ser ao! 
м; tet OT 


Я M - 


1 
ж 


ез 


: —L) 
е = 


¿u A 


+ Atal 


This photo is taken by a U.S. Air Force 
557 / 569 "a En Ж ¥ Ë 


Aircraft. № 


^w: 


ә, 
= 


4 СІ ШІ? Be | 


| don't understand why the Department of Defense releases the Unknown Aircraft image, 
above, in 'black and white' // when they could have released the image in full color instead. 


š 


+ 
„ш 
- 
- 
— 
T 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


561 / 569 561 / 570 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


359 / 569 359 / 570 


350 / 569 334 / 340 


М 


ры 


(! | 


p 
1 / 
) 
J 
- СА Т 
2 | $, є 
` | 9 
М ` y j | ) 
қ | у \ / / 
N / А A / 
NN oL. Mom 7 اب‎ 
` j / > / 
N / / 4 
ә! / 
Е Ay 


алада =s r 


564 / 569 564 / 570 


PASS 
PASSPORT SVERIGE SWEDEN 


PASSEPORT P = SWE 


ПОЈ рот 


NORSTROM 


2. Fórnamn/ Given name 
* PER GUSTAV OLOF 
З. NationaliteU Notionaiity 
SVENSK/ SWEDISH 


Personnr./ Personal 10, № 


7740621: 1799 


.edatum/ Date of b 


21 JUNJUN 74 
Q8 DEC/ ТЕС: 22 
7. Sista айпапе! 5бад/ 


Q8 DEC/DEC 2) 
101809 


| GUSTAV NORSTRÖM 


HÜGKVARTERET 
DATASERVICE ADM AU-IT 


SWEDISH MILITARY HQ W 


352 / 569 336 / 340 


— 
—_ 


iL 


Gustav Norstróm 


U.S. Department of Defense 


356 / 570 


340 / 340 


356 / 569 


RESTRICTED 


SOM!1-01 


TO 12D1-3-11-1 
MAJESTIC-12 GROUP SPECIAL OPERATIONS MANUAL 


EXTRATERRESTRIAL 
ENTITIES AND TECHNOLOGY, 
RECOVERY AND DISPOSAL 


TOP SECRET/MAJIC 
EYES ONLY 


WARNING?! This is a TOP SECRET-MAJIC EYES 
ONLY document containing compartmentalized in- 
formation essential to the national security of the 
United States. EYES ONLY ACCESS to the mater- 
ial herein is strictly limited to personnel possessing 
MAJIC-12 CLEARANCE LEVEL. Examination 
or use by unauthorized personnel is strictly forbid- 
den and is punishable by federal law. 


MAJESTIC-12 GROUP * APRIL 1954 


MJ-12 4838B-Mar 270435°-54-1 


TOPSECRET/MAJIC EYES ONLY 


REMOVAL AND / OR REPLACEMENT OF PAGE(S) ATTACHED TO THE 
DOCUMENT REQUIRES WRITTEN AUTHORIZATION FROM THE MAJIC-12 
OPERATIONS OFFICER AND WILL BE RECORDED BY THE DOCUMENTS/ 
RECORDS OFFICER FOR EACH INSTANCE. 


Г HEPLACEDTRUEADATE | INITE 
5 


E 1135/120CT54 
ЕМ 1015 /1140у54 


ЕМІ. | 0800/10ҒЕВ55 


0920/120CT54 
1595/10Ч0У54 


MJ /01 


32-40 


18.19| 1425/08FEB55 

PAGES 31-40 INCLUSIVE REMOVED PERMANENTLY FROM DOCUMENT 

BY ORDER Mj-12 COMMAND 0930/ 12 APRIL 1955 (М7/031-54 

8-10 | 1200/31MAY55 ЕҮТШЕНІ 1415/31МАҰ55 EWL 
.20 |0959/032UL5 ГЕГІЕІ 0830/12.701.55 

5.6 1304/10МАУ56 MJ/04 ЕН 0900/14MAY56 JRT 

17-19| 1050/16AUG56 а 1635/16AUG56 JRT 


6.12.| 18 0919/05ғЕВ | 57 MJ/01| JRT| 1105/05ҒЕВ57 JRT 


іл 
г 


MJ-12 4838В 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOP SECRET/MAJIC 
EYES ONLY 


WARNING?! This is а TOP SECRET-MAJIC EYES 
ONLY document containing compartmentalized in- 
formation essential to the national security of the 
United States. EYES ONLY ACCESS to the mater- 
ial herein is strictly limited to personnel possessing 
MAJIC-12 CLEARANCE LEVEL. Examination 
or use by unauthorized personnel is strictly forbid- 
den and is punishable by federal law. 


Removal of any page(s) from this document for 
examination by authorized person requires written 
authorization from the MJ-12 OPNAC OPERA- 
TIONS OFFICER. Reproduction in any form or 
the taking of written or transcribed notes is strictly 
forbidden. 


TOPSECRET/MAJIC EYES ONLY 


Special Operations Manual MAJESTIC-12 GROUP 
No. 1- 01 Washington 25, D.C., 7 April 1954 


EXTRATERRESTRIAL ENTITIES AND TECHNOLOGY, 


RECOVERY AND DISPOSAL 
Chapter 1. OPERATION MAJESTIC-12 Paragraphs Page 
Section I. Project purpose and goals ....................... 1-5 2 
Chapter 2. INTRODUCTION 
SECRET ое 6,7 4 
IL Defniion «кб dat ..............— u uu 8-11 4 
Chapter 3. RECOVERY OPERATIONS 
Sedan E: сеу eere зитине у ier 12,13 8 
П. Technology recovery —...............u u... 14-19 9 
Chapter4. RECEIVING AND HANDLING 
Section I. Handling upon receipt of material .......... 20 15 
Chapter 5. EXTRATERRESTRIAL BIOLOGICAL 
ENTITIES 
Section I. Living Organisms ............................... 21-24 17 
П. Non-Living Organisms ........................... 25,26 18 
Chapter 6. GUIDE TO UFO IDENTIFICATION 
Section ES: EOD BUGS SA SSSA 27-29 21 
IL Identification criteria .............................. 30-35 22 
Hi РОННИ ОРИ us 36,37 26 
Appendix REFERENCES USSSA анты 28 
Appenin ka- FORMS sss SS ыы 29 
Appendix П.  MAJIC-12 GROUP РЕКЗОММЕГ........ ......... 30 
Append Ш: PHOTOGRAPHS екон ...... 31 
MJ-12 4838B 1 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


CHAPTER 1 
OPERATION MAJESTIC-12 


Section 1. PROJECT PURPOSE AND GOALS 


1. Scope 


This manual has been prepared especially for Majestic-12 units. Its purpose is to present 
all aspects of Majestic-12 so authorized personnel will have a better understanding of the goals 
of the Group, be able to more expertly deal with Unidentified Flying Objects, Extraterrestrial 
Technology and Entities, and increase the efficiency of future operations. 


2. General 


MJ-12 takes the subject of the UFOBs, Extraterrestrial Technology and Extraterrestrial 
Biological Entities very seriously and considers the entire subject to be a matter of the very 
highest national security. For that reason everything relating to the subject has been assigned the 
very highest security classification. Three main points will be covered in this section. 


a. The general aspects of MJ-12 to clear up any misconceptions that anyone may have. 
b. The importance of the operations. 
c. The need for absolute secrecy in all phases of operations. 


3. Security Classification 


All information relating to MJ-12 has been classified MAJIC EYES ONLY and carries a 
security level 2 points above that of Top Secret. The reason for this has to do with the 
consequences that may arise not only from the impact upon the public should the existence of 
such matters become general knowledge, but also the danger of having such advanced 
technology as has been recovered by the Air Force fall into the hands of unfriendly foreign 
powers. No information is released to the public press and the official government position is 
that no special group such as MJ-12 exists. 


4. History of the Group 


Operation Majestic-12 was established by special classified presidential order on 24 
September 1947 at the recommendation of Secretary of Defense James V. Forrestal and Dr. 
Vannevar Bush, Chairman of the Joint Research and Development Board. Operations are carried 
out under a Top Secret Research and Development - Intelligence Group directly responsible only 
to the President of the Unites States. The goals of the MJ-12 Group are as follows: 

a. The recovery for scientific study of all materials and devices of a foreign or 
extraterrestrial manufacture that may become available. Such material and devices will be 
recovered by any and all means deemed necessary by the Group. 

b. The recovery for scientific study of all entities and remains of entities not of terrestrial 
origin which may become available through independent action by those entities or by 
misfortune or military action. 

c. The establishment and administration of Special Teams to accomplish the above 


MJ-12 4838B 2 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


operations. 

d. The establishment and administration of special secure facilities located at secret 
locations within the continental borders of the Unites States for the receiving, processing, 
analysis, and scientific study of any and all materials and entities classified as being of 
extraterrestrial origin by the Group of the Special Teams. 

e. Establishment and administration of covert operations to be carried out in concert with 
Central Intelligence to effect the recovery for the United States of extraterrestrial technology and 
entities which may come down inside the territory of or fall into the possession of foreign 
powers. 

f. The establishment and maintenance of absolute top secrecy concerning all the above 
operations. 


5. Current Situation 


It is considered as far as the current situation is concerned, that there are few indications 
that these objects and their builders pose a direct threat to the security of the United States, 
despite the uncertainty as to their ultimate motives in coming here. Certainly the technology 
possessed by these beings far surpasses anything known to modern science, yet their presence 
here seems to be benign, and they seem to be avoiding contact with our species, at least for the 
present. Several dead entities have been recovered along with a substantial amount of wreckage 
and devices from downed craft, all of which are now under study at various locations. No 
attempt has been made by extraterrestrial entities either to contact authorities or to recover their 
dead counterparts or the downed craft, even though one of the crashes was the result of direct 
military action. The greatest threat at this time arises from the acquisition and study of such 
advanced technology by foreign powers unfriendly to the United States. It is for this reason that 
the recovery and study of this type of material by the United States has been given such a high 


priority. 


MJ-12 4838B 3 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


CHAPTER 2 
INTRODUCTION 


Section 1. GENERAL 


6. Scope 


a. This operation manual is published for the information and guidance of all concerned. 
It contains information on determination, documentation, collection, and disposition of debris, 
devices, craft, and occupants of such craft as defined as Extraterrestrial Technology or 
Extraterrestrial Biological Entities, EBEs in Section II of this chapter. 

b. Appendix I-Ia contains а list of current references, including technical manuals and 
other available publications applicable to these operations. 

c. Appendix II contains a list of personnel who comprise the Majestic-12 Group. 


7. Forms and Records 
Forms used for reporting operation are listed in Appendix I. 


Section Il. DEFINITION AND DATA 


8. General 


Extraterrestrial Technology is defined as follows: 

a. Aircraft identified as not manufactured in the United States or any terrestrial foreign 
powers, including experimental military or civilian aircraft. Aircraft in this category are 
generally known as Unidentified Flying Objects, or UFOBs. Such aircraft may appear as one of 
several shapes and configurations and exhibit extraordinary flight characteristics. 

b. Objects and devices of unknown origin or function, manufactured by processes or of 
materials not consistent with current technology or scientific knowledge. 

c. Wreckage of any aircraft thought to be of extraterrestrial manufacture or origin. Such 
wreckage may be the results of accidents or military action. 

d. Materials that exhibit unusual or extraordinary characteristics not consistent with 
current technology or scientific knowledge. 

Extraterrestrial Biological Entities (EBEs) are described as: 

a. Creatures, humanoids or otherwise, whose evolutionary processes responsible for their 
development are demonstrably different from those postulated or observed in homo sapiens. 


9. Description of Craft 


Documented extraterrestrial craft (UFOBs) are classified in one of four categories based 
on general shape, as follows: 

a. Elliptical, or disc shape. This type of craft is of a metallic construction and dull 
aluminum in color. They have the appearance of two pie-pans or shallow dishes pressed 
together and may have a raised dome on the top or bottom. No seams or joints are visible on the 
surface, giving the impression of one-piece construction. Discs are estimated from 50-300 feet 
in diameter and the thickness is approximately 15 per cent of the diameter, not including the 


MJ-12 4838B 4 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


dome, which is 30 per cent of the disc diameter and extends another 4-6 feet above the main 
body of the disc. The dome may or may not include windows or ports, and ports are present 
around the lower rim of the disc in some instances. Most disc-shaped craft are equipped with 
lights on the top and bottom, and also around the rim. These lights are not visible when the craft 
is at rest or not functioning. There are generally no visible antenna or projections. Landing gear 
consists of three extendible legs ending in circular landing pads. When fully extended this 
landing gear supports the main body 2-3 feet above the surface at the lowest point. A 
rectangular hatch is located along the equator or on the lower surface of the disk. 

b. Fuselage or cigar shape. Documented reports of this type of craft are extremely rare. 
Air Force radar reports indicate they are approximately 2 thousand feet long and 95 feet thick, 
and apparently they do not operate in the lower atmosphere. Very little information is available 
on the performance of these craft, but radar reports have indicated speeds in excess of 7,000 
miles per hour. They do not appear to engage in the violent and erratic maneuvers associated 
with the smaller types. 

c. Ovoid or circular shape. This type of craft is described as being shaped like an ice 
cream cone, being rounded at the large end and tapering to a near-point at the other end. They 
are approximately 30-40 feet long and the thick end diameter is approximately 20 per cent of the 
length. There is an extremely bright light at the pointed end, and this craft usually travels point 
down. They can appear to be any shape from round to cylindrical, depending upon the angle of 
observation. Often sightings of this type of craft are elliptical craft seen at an inclined angle or 
edge-on. 

d. Airfoil or triangular shape. This craft is believed to be new technology due to the 
rarity and recency of the observations. Radar indicates an isosceles triangle profile, the longest 
side being nearly 300 feet in length. Little is known about the performance of these craft due to 
the rarity of good sightings, but they are believed capable of high speeds and abrupt maneuvers 
similar to or exceeding the performance attributed to types “а” and “с”. 


10. Description of Extraterrestrial Biological Entities (EBEs) 


Examination of remains recovered from wreckage of UFOBs indicates that 
Extraterrestrial Biological Entities may be classified into two distinct categories as follows: 

a. EBE Type I. These entities are humanoid and might be mistaken for human beings of 
the Oriental race if seen from a distance. They are bi-pedal, 5-5 feet 4 inches in height and 
weigh 80-100 pounds. Proportionally they are similar to humans, although the cranium is 
somewhat larger and more rounded. The skin is a pale, chalky-yellow in color, thick, and 
slightly pebbled in appearance. The eyes are small, wide-set, almond-shaped, with brownish- 
black irises with very large pupils. The whites of the eyes are not like that of humans, but have a 
pale gray cast. The ears are small and set low on the skull. The nose is thin and long, and the 
mouth is wider than in humans, and nearly lipless. There is no apparent facial hair and very little 
body hair, that being very fine and confined to the underarm and the groin area. The body is thin 
and without apparent body fat, but the muscles are well-developed. The hands are small, with 
opposable, and there is no webbing between the fingers as in humans. The legs are slightly but 
noticeably bowed, and the feet are somewhat splayed and proportionally large. 


MJ-12 4838B 5 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


b. EBE Type II. These entities are humanoid but differ from Type I in many respects. 
They are bi-pedal, 3 feet 5 inches - 4 feet 2 inches in height and weigh 25-50 pounds. 
Proportionally, the head is much larger than humans or Type I EBEs, the cranium being much 
larger and elongated. The eyes are very large, slanted, and nearly wrap around the side of the 
skull. They are black with no whites showing. There is no noticeable brow ridge, and the skull 
has a slight peak that runs over the crown. The nose consists of two small slits which sit high 
above the slit-like mouth. There are no external ears. The skin is a pale bluish-gray color, being 
somewhat darker on the back of the creature, and is very smooth and fine-celled. There is no 
hair on either the face or the body, and these creatures do not appear to be mammalian. The 
arms are long in proportion to the legs, and the hands have three long, tapering fingers and a 
thumb which is nearly as long as the fingers. The second finger is thicker than the others, but not 
as long as the index finger. The feet are small and narrow, and four toes are joined together with 
a membrane. 

It is not definitely known where either type of creature originated, but it seems certain 
that they did not evolve on earth. It is further evident, although not certain, that they may have 
originated on two different planets. 


11. Description of Extraterrestrial Technology 


The following information is from preliminary analysis reports of wreckage collected 
from crash sites of extraterrestrial craft 1947-1953, excerpts from which are quoted verbatim to 
provide guidance as to the type of characteristics of material that might be encountered in future 
recovery operations. 

a. Initial analysis of the debris from the crash site seems to indicate that the debris is that 
of an extraterrestrial craft which exploded from within and came into contact with the ground 
with great force, completely destroying the craft. The volume of matter indicates that the craft 
was approximately the size of a medium aircraft, although the weight of the debris indicates that 
the craft was extremely light for its size. 

b. Metallurgical analysis of the bulk of the debris recovered indicates that the samples are 
not composed of any materials currently known to Terrestrial science. 

c. The material tested possesses great strength and resistance to heat in proportion to its 
weight and size, being stronger by far than any materials used in military or civilian aircraft at 
present. 

d. Much of the material, having the appearance of aluminum foil or aluminum- 
magnesium sheeting, displays none of the characteristics of either metal, resembling instead 
some kind of unknown plastic-like material. 

e. Solid structures and substantial beams having a distinct similarity in appearance to 
very dense grain-free wood, was very light in weight and possesses tensile and compression 
strength not obtainable by any means known to modern industry. 

f. None of the material tested displayed measurable magnetic characteristics or residual 
radiation. 

g. Several samples were engraved or embossed with marks and patterns. These patterns 
were not readily identifiable and attempts to decipher their meaning has been largely 
unsuccessful. 

h. Examination of several apparent mechanical devices, gears, etc. revealed little or 
nothing of their functions or methods of manufacture. 


MJ-12 4838B 6 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


CHAPTER 3 
RECOVERY OPERATIONS 


Section 1. SECURITY 


12. Press Blackout 


Great care must be taken to preserve the security of any location where Extraterrestrial 
Technology might be retrievable for scientific study. Extreme measures must be taken to protect 
and preserve any material or craft from discovery, examination, or removal by civilian agencies 
or individuals of the general public. It is therefore recommended that a total press blackout be 
initiated whenever possible. If this course of action should not prove feasible, the following 
cover stories are suggested for release to the press. The officer in charge will act quickly to 
select the cover story that best fits the situation. It should be remembered when selecting a cover 
story that official policy regarding UFOBs is that they do not exist. 

a. Official Denial. The most desirable response would be that nothing unusual has 
occurred. By stating that the government has no knowledge of the event, further investigation by 
the public press may be forestalled. 

b. Discredit Witnesses. If at all possible, witnesses will be held incommunicado until the 
extent of their knowledge and involvement can be determined. Witnesses will be discouraged 
from talking about what they have seen, and intimidation may be necessary to ensure their 
cooperation. If witnesses have already contacted the press, it will be necessary to discredit their 
stories. This can best be done by the assertion that they have either misinterpreted natural 
events, are the victims of hysteria or hallucinations, or are the perpetrators of hoaxes. 

c. Deceptive Statements. It may become necessary to issue false statements to preserve 
the security of the site. Meteors, downed satellites, weather balloons, and military aircraft are all 
acceptable alternatives, although in the case of the downed military aircraft statement care 
should be exercised not to suggest that the aircraft might be experimental or secret, as this might 
arouse more curiosity of both the American and the foreign press. Statements issued concerning 
contamination of the area due to toxic spills from trucks or railroad tankers can also serve to 
keep unauthorized or undesirable personnel away from the area. 


13. Secure the Area 


The area must be secured as rapidly as possible to keep unauthorized personnel from 
infiltrating the site. The officer in charge will set up a perimeter and establish a command post 
inside the perimeter. Personnel allowed on the site will be kept to the absolute minimum 
necessary to prepare the craft or debris for transport, and will consist of Military Security Forces. 

Local authorities may be pressed into service on traffic and crowd control. Under no 
circumstances will local official or law enforcement personnel be allowed inside the perimeter 
and all necessary precautions should be taken to ensure that they do not interfere with the 
operation. 

a. Perimeter. It is desirable that sufficient military personnel be utilized to set up а 
perimeter around the site large enough to keep both unauthorized personnel and the perimeter 


МЈ-12 4838B 7 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


personnel from seeing the site. Once the site is contained, regular patrols will be set up along the 
perimeter to ensure complete security, and electronic surveillance will be utilized to augment the 
patrols. Perimeter personnel will be equipped with hand communication and automatic weapons 
with live ammunition. Personnel working at the site will carry sidearms. No unauthorized 
personnel will be allowed into the secure area. 

b. Command Post. Ideally, the command post should be as close to the site as is practical 
to efficiently coordinate operations. As soon as the command post is operational, contact with 
the Majestic-12 Group will be established via secure communications. 

c. Area Sweep. The site and the surrounding area will be cleared of all unauthorized 
personnel. Witnesses will be debriefed and detained for further evaluation by MJ-12. Under no 
circumstances will witnesses be released from custody until their stories have been evaluated by 
MJ-12 and they have been thoroughly debriefed. 

d. Situation Evaluation. A preliminary evaluation of the situation will be completed and 
a preliminary report prepared. The MJ-12 Group will then be briefed on the situation at the 
earliest possible opportunity. The MJ-12 Group will then make a determination as to whether or 
not a MJ-12 RED TEAM or OPNAC Team will be dispatched to the area. 


Section ІІ. TECHNOLOGY RECOVERY 


14. Removal and Transport 


As soon as communication is established, removal and transport of all material will 
commence under order from MJ-12. 

a. Documentation. И the situation permits, care should be taken to document the area 
with photographs before anything is moved. The area will be checked for radiation and other 
toxic agents. If the area cannot be kept secure for an extended period of time, all material must 
be packed and transported as quickly as possible to the nearest secure military facility. This will 
be accomplished by covered transport using little-traveled roads wherever possible. 

b. Complete or Functional Craft. Craft are to be approached with extreme caution if they 
appear functional, as serious injury may result from exposure to radiation and electrical 
discharges. If the craft is functioning, but appears to be abandoned, it may be approached only 
by specially trained MJ-12 RED TEAM personnel wearing protective clothing. Any device that 
seems to be functioning should also be left to MJ-12 RED TEAM disposal. Complete craft and 
parts of crafts too large to be transported by covered transport will be disassembled, if this can be 
accomplished easily and quickly. If they must be transported whole, or on open flatbed trailers, 
they will be covered in such a manner as to camouflage their shape. 

c. Extraterrestrial Biological Entities. EBEs must be removed to a top security facility as 
quickly as possible. Great care should be taken to prevent possible contamination by alien 
biological agents. Dead EBEs should be packed in ice at the earliest opportunity to preserve 
tissues. Should live EBEs be encountered, they should be taken into custody and removed to a 
top security facility by ambulance. Every effort should be taken to ensure the EBE's survival. 
Personnel involvement with EBEs alive or dead must be kept to an absolute minimum. (See 
Chapter 5 for more detailed information dealing with EBEs.) 


MJ-12 4838B 8 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


15. Cleansing the Area 


Once all material has been removed from the central area, the immediate area will be 
thoroughly inspected to make sure that all traces of Extraterrestrial Technology have been 
removed. In the case of a crash, the surrounding area will be thoroughly gone over several times 
to ensure that nothing has been overlooked. The search area involved may vary according to 
local conditions, at the discretion of the officer in charge. When the officer in charge is satisfied 
that no further evidence of the event remains at the site, it may be evacuated. 


16. Special or Unusual Conditions 


The possibility exists that extraterrestrial craft may land or crash in heavily populated 
areas, where security cannot be maintained or where large segments of the population and the 
public press may witness these events. Contingency Plan MJ-1949-04P / 78 (TOP SECRET- 
EYES ONLY) should be held in readiness should the need to make a public disclosure become 
necessary. 


MJ-12 4838B 9 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


от 


MFT TVI3Q34 АЯ NYGGISUOJ SI WHOA ANV NI NOLLINGOUdTa 
AINO БЯАЯ ОТГУИ / ТЯМОЯ5 dO L 


176 15 tory 
88-85 12 Зшрітя 


OTO-ALAA 
УРА 


"“Кпюдиом әлізиәҙор 10 омзцецо әд OF зу8поцу S3iAƏp е JO uoruod 10 аллар Au 

"шу pue $44248 03044 “suvys *sdeur *s8urpioses 21:01322]3 oye pyung 
зарвш DUBBO dsns 1940 

put sutua оптийто 'suisrum820 jo suoniod 10 SUISILRS10 upuimu-uou posea2o(q 

"кә 2198405691 Jo ро08 3uaedde ш 505100810 ueumy-uou BütAT7 
одо ‘so[qHs93u! o1uvfao *sSuifluojoq jeuosuod 

“Ишціо|2 se ons ammeu nioddns в jo зецаеш 21u01329]2-u0u 10 |вошецоэш-цом 
"sensuojovieuo Gieurploenxo JO [ensnum {Хә цеца pue 4801000291 

рив ooueros шамио о} UMOWY JOU вые 10 єушошојә зо роѕойшоо sjuou Sv. 
“O19 "ànsgjd "ииваизеш *tunutumge ел 'Agojouuoa) рив 3019155 

поло 0) пмоцу se pozrus0221 Кибво speriat то вита] Jo ровойшод зиэшет I 
"spouted pug sə3iAəp |0диоо pejtioosse 


19-4м 48197181 
10-589 OVN4O 


Ox-du3 
010-993 


19-4 чел ang 16-45 


fS 15 Bary и-еогал 


1-5 15 vay Юг 


р-9 IŞ tuy г)8-0ғ-а4 pue тоту “иип повиадст 21915504 ore qorqa 51091301] Jo seurgowur pue sa3iAa(] 
"ојӣшоо Арвош 

PS IS Bay №м505-аа mq рәбешер aq о} sreaddg yorym ошцовш 10 аэтдар әшолсәрә 10 [зэтазузаш Luy 
Зецоцошу 


FS 15 PIV 3T-TOC-GHI 
9-с00-У1 


aP% ст 


pu» poseurepun 24 o) sreadde цеца ошцовш 10 Ə31A3D ошолсәТә Jo үвәїйвүдәш Ашу 
"зицовимеш pue uñisəp фещвеленха JO aia завуш-циов 10 'feuore1edo Зов 


AINO SHAT ОТГУИ / LAXOAS аот 


“BIPOW 
"Anus 
SU:Af[-UON 
« Ques Sur] 
“suoisiAoid 
рив soyddng 
"Зашел 
pognuoprur] 
жәшігі 
рауичерт 


зов Шәлод 
"залор 
реввшед 


“Ə91A9p ә 


51981 0625115585 бојоццоә г emsan 'ZL 


TOPSECRET/MAJIC EYES ONLY 


18. Use of Inventory System 


a. The identification is performed as a duty of the officer making an inventory of the 
Extraterrestrial Technology or entities with the assistance of MJ Forms 1-006 and 1-007. (Fig. 1 
and 2.) Instructions for the use of each form appear on the reverse side of the forms. 


SOM 01 - 1 
Figure 1. MJ Form 1-006 


MJ-12 4838B 11 
TOPSECRET/MAJIC EYESONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


ТОР ЗЕСКЕТ ; MAJIC EY ES ONLY 


ЕЛІ МЕНДЕН mid IE D t PACKING LIST 


TOP SECRET / МАПС EY ES ONL Y 


SOM 01 -2 
Figure 2. MJ Form 1-007 


19. Packaging and Packing Data 


a. Domestic Shipment. Individual items are tagged and wrapped in a moisture- 
vaporproof barrier and heat sealed. They are then placed in a corrugated fiberboard box. The 
voids within the box are packed thoroughly with a neutral cellulose wadding to prevent 


MJ-12 4838B 12 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


movement of the items. The box closure is sealed with gummed Kraft tape. MJ Form 1-007 is 
placed іп a sealed manila envelope marked *MAJIC-12 ACCESS ONLY” and is firmly taped to 
the top of the box. The box is then cushioned at each corner and at the top and bottom with 
fiberboard inserts and is placed within a large corrugated fiberboard box. The entire outer box 
closure is sealed with gummed Kraft tape. A label is affixed to the outer box bearing the 
following information: destination, shipping code number, and the warning, *MAJIC-12 
ACCESS ONLY." 

b. Overseas Shipment. Items are packaged as described above except that a dessicant and 
humidity indicator are included within the inner corrugated fiberboard box. Next, the box is 
wrapped in a moisture-vaporproof barrier and heat sealed. Then, packaged items are placed 
within a second waterproof carton sealed with waterproof tape. This second carton is marked 
*MAJIC-12 ACCESS ONLY” on all sides and is placed within а water-grease proof lined 
wooden shipping container. The lining is sealed with waterproof tape and the wooden shipping 
container is screwed shut. The shipping container is reinforced further by nailing two [3/4]-inch 
metal caps about 8 inches from each end. Shipping information is then stenciled on the surface 
of the wooden shipping container. 

Note. The packaging and packing procedure detailed above applies to non-organic items only. 
Data for handling, packaging, packing, and shipping of organic matter and non-living entities is provided 
in Chapter 5, Section II of this manual. 


MJ-12 4838B 13 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


CHAPTER 4 
RECEIVING AND HANDLING 


Section 1. HANDLING UPON RECEIPT OF MATERIAL 


20.  Uncrating, Unpacking, and Checking 


(Fig. 3) 
Note. The uncrating, unpacking, and checking procedure for containers marked *MAJIC-12 
ACCESS ONLY” will be carried out by personnel with MJ-12 clearance. Containers marked in 
this manner will be placed in storage in a top security area until such time as authorized 
personnel are available for these procedures. 


a. Be very careful when uncrating and unpacking the material. Avoid thrusting tools into 
the interior of the shipping container. Do not damage the packaging material any more than is 
absolutely necessary to remove the specimens; these materials may be required for future 
packaging. Stow the interior packaging material within the shipping container. When uncrating 
and unpacking the specimens, follow the procedure given in (1) through (11) below: 

(1) Unpack the specimens in a top security area to prevent access of 
unauthorized personnel. 

(2 Cut the metal wires with a suitable cutting tool, or twist them with 
pliers until the straps crystallize and break. 

(3 | Remove screws from the top of the shipping container with a screw driver. 

(4) Сш the tape and seals of the case liner so that the waterproof paper will be 
damaged as little as possible. 

(5) Lift out the packaged specimens from the wooden case. 

(6) Си the tape which seals the top flaps of the outer cartons; be careful not to 
damage the cartons. 

(7) Сш the barrier along the top heat-sealed seam and carefully 
remove the inner carton. 

(8) | Remove the sealed manila envelope from the top of the inner carton. 

(9) Open the inner carton and remove the fiberboard inserts, dessicant and 
humidity indicator. 

(10) Lift out the heat-sealed packaging containing the specimens; arrange them 
in an orderly manner for inspection. 

(11) Place all packaging material in the shipping container for use in future 


repacking. 


MJ-12 4838B 14 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


а ри ч : 
Mi far or. wb "t the 
Da fv (s the 


SOM 01-3 


Figure 3. Packaging diagram 


b. Thoroughly check all items against the shipping documents. Carefully inspect all 
items for possible damage during shipping or handling. Sort the items according to classification 
number in preparation for transfer to the designated laboratory or department. Laboratory or 
department personnel are responsible for transporting items to the designated areas. This will be 
accomplished as quickly as possible by covered transport escorted by security personnel. 


MJ-12 4838B 15 


TOPSECRET/ MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


CHAPTER 5 
EXTRATERRESTRIAL BIOLOGICAL ENTITIES 


Section |. LIVING ORGANISMS 


21. Scope 


a. This section deals with encounters with living Extraterrestrial Biological Entities 
(EBEs). Such encounters fall under the jurisdiction of MJ-12 OPNAC BBS-01 and will be dealt 
with by this special unit only. This section details the responsibilities of persons or units making 
the initial contact. 


22. General 


Any encounter with entities known to be of extraterrestrial origin is to be considered to 
be a matter of national security and therefore classified TOP SECRET. Under no circumstances 
is the general public or the public press to learn of the existence of these entities. The official 
government policy is that such creatures do not exist, and that no agency of the federal 
government is now engaged in any study of extraterrestrials or their artifacts. Any deviation 
from this stated policy is absolutely forbidden. 


23. Encounters 


Encounters with EBEs may be classified according to one of the following categories: 

a. Encounters initiated by EBEs. Possible contact may take place as a result of overtures 
by the entities themselves. In these instances it is anticipated that encounters will take place at 
military installations or other obscure locations selected by mutual agreement. Such meetings 
would have the advantage of being limited to personnel with appropriate clearance, away from 
public scrutiny. Although it is not considered very probable, there also exists the possibility that 
EBEs may land in public places without prior notice. In this case the OPNAC Team will 
formulate cover stories for the press and prepare briefings for the President and the Chiefs of 
Staff. 

b. Encounters as the result of downed craft. Contact with survivors of accidents or craft 
downed by natural events or military action may occur with little or no warning. In these cases, 
it is important that the initial contact be limited to military personnel to preserve security. 
Civilian witnesses to the area will be detained and debriefed by MJ-12. Contact with EBEs by 
military personnel not having MJ-12 or OPNAC clearance is to be strictly limited to action 
necessary to ensure the availability of the EBEs for study by the OPNAC Team. 


24. Isolation and Custody 


a. EBEs will be detained by whatever means are necessary and removed to a secure 
location as soon as possible. Precautions will be taken by personnel coming in contact with 
EBEs to minimize the risk of disease as a result of contamination by unknown organisms. If the 
entities are wearing space suits or breathing apparatus of some kind, care should be exercised to 
prevent damage to these devices. While all efforts should be taken to assure the well-being of 
the EBEs, they must be isolated from any contact with unauthorized personnel. While it is not 
clear what provisions or amenities might be required by non-human entities, they should be 


MJ-12 4838B 16 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


provided if possible. The officer in charge of the operation will make these determinations, as 
no guidelines now exist to cover this area. 

b. Injured or wounded entities will be treated by medical personnel assigned to the 
OPNAC Team. If the team medical personnel are not immediately available, First Aid will be 
administered by Medical Corps personnel at the initial site. Since little is known about EBE 
biological functions, aid will be confined to the stopping of bleeding, bandaging of wounds and 
splinting of broken limbs. No medications of any kind are to be administered as the effect of 
terrestrial medications on non-human biological systems are impossible to predict. As soon as 
the injuries are considered stabilized, the EBEs will be moved by closed ambulance or other 
suitable conveyance to a secure location. 

c. In dealing with any living Extraterrestrial Biological Entity, security is of paramount 
importance. All other considerations are secondary. Although it is preferable to maintain the 
physical well-being of any entity, the loss of EBE life is considered acceptable if conditions or 
delays to preserve that life in any way compromises the security of the operations. 

d. Once the OPNAC Team has taken custody of the EBEs, their care and transportation to 
designated facilities become the responsibility of OPNAC personnel. Every cooperation will be 
extended to the team in carrying out duties. OPNAC Team personnel will be given TOP 
PRIORITY at all times regardless of their apparent rank or status. No person has the authority to 
interfere with the OPNAC Team in the performance of its duties by special direction of the 
President of the United States. 


Section Il. NON-LIVING ORGANISMS 


25. Scope 


Ideally, retrieval for scientific study of cadavers and other biological remains will be 
carried out by medical personnel familiar with this type of procedure. Because of security 
considerations, such collection may need to be done by non-medical personnel. This section will 
provide guidance for retrieval, preservation, and removal of cadavers and remains in the field. 


26. Retrieval and Preservation 


а. The degree of decomposition of organic remains will vary depending on the length of 
time the remains have been lying in the open unprotected and may be accelerated by both local 
weather conditions and action by predators. Therefore, biological specimens will be removed 
from the crash site as quickly as possible to preserve the remains in as good a condition as 
possible. A photographic record will be made of all remains before they are removed from the 
site. 

b. Personnel involved in this type of operation will take all reasonable precautions to 
minimize physical contact with the cadavers or remains being retrieved. Surgical gloves should 
be worn or, if they are not available, wool or leather gloves may be worn provided they are 
collected for decontamination immediately after use. Shovels and entrenching tools may be 
employed to handle remains provided caution is exercised to be certain no damage is done to the 
remains. Remains will be touched with bare hands only if no other means of moving them can 
be found. All personnel and equipment involved in recovery operations will undergo 
decontamination procedures immediately after those operations have been completed. 


MJ-12 4838B 17 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


c. Remains will be preserved against further decomposition as equipment and conditions 
permit. Cadavers and remains will be bagged or securely wrapped in waterproof coverings. 
Tarpaulins or foul weather gear may be used for this purpose if necessary. Remains will be 
refrigerated or packed with ice if available. All remains will be tagged or labeled and the time 
and date recorded. Wrapped remains will be placed on stretchers or in sealed containers for 
immediate removal to a secure facility. 

d. Small detached pieces and material scraped from solid surfaces will be put in jars or 
other small capped containers if available. Containers will be clearly marked as to their contents 
and the time and date recorded. Containers will be refrigerated or packed with ice as soon as 
possible and removed to a secure facility. 


MJ-12 4838B 18 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


Y 


“ 
eoe 7 


Note: Illustrations in this diagram are gathered from documented sightings in Air Force and Central Intelligence and from 
Examination of wreckage collected from various sources years 1947-1953 inclusive. 


SOM 01-4 
Figure 4. Extraterrestrial Craft 


MJ-12 4838B 19 


TOPSECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOPSECRET/MAJIC EYES ONLY 


CHAPTER 6 
GUIDE TO UFO IDENTIFICATION 


Section 1. UFOB GUIDE 


27. Follow-up Investigations 


A UFOB report is worthy of follow-up investigation when it contains information to 
suggest that positive identification with a well-known phenomenon may be made or when it 
characterizes an unusual phenomenon. The report should suggest almost immediately, largely 
by the coherency and clarity of the data, that there is something of identification and / or 
scientific value. In general, reports which should be given consideration are those which involve 
several reliable observers, together or separately, and which concern sightings of greater duration 
than one quarter minute. Exception should be made to this when circumstances attending the 
report are considered to be extraordinary. Special attention should be given to reports which 
give promise to а “fix” on the position and those reports involving unusual trajectories. 


28. Rules of Thumb 


Each UFOB case should be judged individually but there are a number of “rules of 
thumb", under each of the following headings, which should prove helpful in determining the 
necessity for follow-up investigation. 

a. Duration of Sighting. When the duration of a sighting is less than 15 seconds, the 
probabilities are great that it is not worthy of follow-up. As a word of caution, however, should 
a large number of individual observers concur on an unusual sighting of a few seconds duration, 
it should not be dismissed. 

b. Number of Persons Reporting the Sighting. Short duration sightings by single 
individuals are seldom worthy of follow-up. Two or three competent independent observations 
carry the weight of 10 or more simultaneous individual observations. As an example, 25 people 
at one spot may observe a strange light in the sky. This, however, has less weight than two 
reliable people observing the same light from different locations. In the latter case a position-fix 
is indicated. 

c. Distance from Location of Sightings to Nearest Field Unit. Reports which meet the 
preliminary criterion stated above should all be investigated if their occurrence is in the 
immediate operating vicinity of the squadron concerned. For reports involving greater distances, 
follow-up necessity might be judged as being inversely proportional to the square of the 
distances concerned. For example, an occurrence 150 miles away might be considered to have 
four times the importance (other things being equal) than one that is 300 miles away. 

d. Reliability of Person or Persons Reporting. Іп establishing the necessity of follow-up 
investigation only “short term" reliability of individuals can be employed. Short term reliability 
is judged from the logic and coherency of the original report and by the age and occupation of 
the person. Particular attention should be given to whether the occupation involves observation 
reporting or technical knowledge. 

e. Number of Individual Sightings Reported. Two completely individual sightings, 
especially when separated by a mile or more constitutes sufficient cause for follow-up, assuming 
previous criterion have not been violated. 


MJ-12 4838B 20 


TOP SECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOP SECRET/MAJIC EYES ONLY 


f The Value of Obtaining Additional Information Immediately. If the information cannot 
be obtained within seven days, the value of such information is greatly decreased. It is of great 
value to obtain additional information immediately if previously stated criteria have been met. 
Offen, if gathered quickly, two or three items (weather conditions, angular speed, changes in 
trajectory, duration, etc.) are sufficient for immediate evaluation. If investigation is undertaken 
after weeks or months, the original observers cease to be of value as far as additional new 
information is concerned. Generally, late interrogation yields only bare repetition of facts 
originally reported plus an inability on the part of the observer to be objective. 

8. Existence of Physical Evidence (Photographs, Material, Hardware). Іп cases where 
any physical evidence exists, a follow-up should be made even if some of the above criteria have 
not been met. 


29. Conclusion - UFOB Guide. 


It is understood that all above criteria must be evaluated in terms of “common sense." 
The original report, from its working and clarity will almost always suggest to the reader 
whether there is any “paydirt” in the report. 


Section Il. IDENTIFICATION CRITERIA 


30. General 


When a UFO report meets, in large measure, the criteria projected in Section I and a 
follow-up investigation is instituted, then the interrogator should ask what physical object or 
objects might have served as the original stimulus for the report. The word “object” here 
includes optical phenomena such as reflections from clouds, sundogs, etc. Frequently one or 
perhaps two solutions will be immediately suggested by the nature of the report. The word 
“solution” cannot be used here in the scientific sense. A solution in UFOB work means that a 
hypothesis has been arrived at which appears to have the greatest probability of having given rise 
to the given report. Following is a group of hypotheses or examples which should prove helpful 
in arriving at solutions. A check should be made to see how many of the items are satisfied by 
the report and how many are missing. An effort should be made to obtain any missing items as 
soon as possible. Each typical hypothesis is listed in a separate paragraph. 


31. Aircraft 


a. Shape. From conventional to circular or elliptical. 

b. Size. Pinpoint to actual 

c. Color. Silver to bright yellow (night - black or color of lights). 

d. Speed. Generally only angular speeds can be observed. This depends on distance but 
small objects crossing major portion of sky in less than a minute can be ruled out. Aircraft will 
not cross major portion of sky in less than a minute whereas a meteor certainly will. 

e. Formation. Two to twenty. Numbers greater than 20 more likely birds than aircraft. 

f. Trails. May or may not have (vapor and exhaust). 

g. Sound. Zero to loud shrill or low depending on altitude. 

h. Course. Steady, straight or gently curving (not erratic - may appear still if approaching 
head-on). Right angle turns and sudden reversals, changes in altitude ruled out. Note: Although 
report may indicate erratic course, if other items check, follow-up should proceed on basis of 


MJ-12 4838B 21 


TOP SECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOP SECRET/MAJIC EYES ONLY 


aircraft because of psychological tendencies of excited people to exaggerate course changes. 
i. Time In Sight. More than 15 seconds, generally of the order of a minute or two. 
j. Lighting Conditions. Night or Day. 
k. Radar. Should show normal aircraft returns. 


32. Balloons 


a. Shape. Round to cigar or pinpoint. 

b. Size. Balloons up to a hundred feet will generally appear from pinpoint to size of a pea 
held at arm length. 

c. Color. Silver, white or many tints. It may possibly appear dark as when projected 
against the clouds. 

d. Speed. Large scale erratic speed ruled out. In general, hovering to slow apparent 
speed. 

e. Formation. Single to cluster. 

f. Trail. None. 

g. Sound. None. 

h. Course. Straight with a general gradual ascent, unless falling. 

i. Time In Sight. Generally long. Note: Balloons may suddenly burst and disappear. 

j. Lighting Conditions. Night or day but especially at sunset. 

k. Radar. No return except when carrying sonde equipment. 


33. Meteor 


a. Shape. Round to elongated. 
b. Size. Pinpoint to size of moon. 

c. Color. Flaming yellow with red, green or blue possible. 

d. Speed. Crosses large portion of sky in few seconds except if coming head-on. 

e. Formation. Generally single - can break into shower at end of trajectory. 
Occasionally (but rare) small groups. 

f Trail. At night almost always a luminous train which can persist as long as a half hour 
(rarely). Daytime meteors are much less frequently observed. In daytime, leaves a whitish to 
dark smoke trail. 

g. Sound. None, although occasionally reported (believed psychological). 

h. Course. Generally streaking downward, but not necessarily sharply downward. Can 
on rare occasion give impression of slight rise. 

i. Time In Sight. Longest report about 30 seconds, generally less than 10. 

j. Lighting Conditions. Day or Night. Mostly night. 

k. Radar. Return from meteor itself is highly improbable, however, the train left by a 
meteor, is a good radar reflector. 

1. Other. Ап exceptionally bright meteor is called a fireball. These are rare but extremely 
spectacular and on occasion have been known to light surroundings to the brightness of daylight. 


MJ-12 4838B 22 


ТОР SECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOP SECRET/MAJIC EYES ONLY 


34. Stars or Planets 


The planets, Venus, Mars, Jupiter, and Saturn are generally brighter than any star, but 
they twinkle very much less (unless very close to horizon). Stars twinkle a great deal and when 
near the horizon can give impression of flashing light in many colors. 

a. Shape. Pinpoint - starlike. 

b. Size. Never appreciable. 

c. Color. Yellow with rainbow variations. 

d. Speed. Stars apparent speeds carry them from east to west in the course of the night 
but they are often reported as erratic. The effect is psychological, most people being unable to 
consider a point as being stationary. Occasionally turbulence in the upper atmosphere can cause 
a star to appear to jump (rare) but somehow twinkling gives the impression of movement to 
many people. 

Note: Just because the report says the light moves does not rule out the possibility of it 
being a star unless motion is from one part of sky to another relatively short time. 

e. Formation. There are no clusters of very bright stars but faint stars are grouped in their 
familiar constellations. Note: a report of 4 or 5 bright clustering lights would rule out stars. 

f Trail. None. 

g. Sound. None. 

h. Course. Always describe 24 hour circle around pole of sky from east to west. 

i. Time In Sight. When clear, stars are always visible. Most stars rise or set during the 
course of the night. Stars low in western sky set within an hour or two. Stars in east, always go 
higher in sky. 

j. Lighting Conditions. Night - twilight. 

k. Radar. None. 


35. Optical Phenomena 


This can cover a multitude of things. Original scanning of the report should be made to 
attempt to determine whether it more likely describes a material object or an optical 
phenomenon. Optical phenomena which have been reported as UFOBs run from reflections on 
clouds and layers of ice crystals (sundogs) to the many types of mirages. No one set of optical 
phenomena can be set down as representation for the whole class. There is no limit to the speed 
of optical phenomena. Reflections can travel from incredible speed, as in the case of a search- 
beacon on high clouds, to stationary. These cases if well reported will almost always warrant 
follow-up. Their variety and connection with upper atmospheric conditions make these 
observations especially valuable scientifically. 

а. Shape. Generally round but can be elliptical or linear. 

b. Size. Starlike to large luminous glow. 

c. Color. Generally yellow. 

d. Speed. Stationary to fantastic. 

e. Formation. Any. 

f Trail. None. 

g. Sound. None. 

h. Course. Any. 

i. Time In Sight. Any. 

j. Lighting Conditions. Day and night. 

k. Radar. No return. In special cases, radar response will occasionally have to do with 


MJ-12 4838B 23 


TOP SECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOP SECRET/MAJIC EYES ONLY 


unusual clouds, and meteorological phenomena such as described іп Minnaert’s book “Light and 
Color in the Open Air." 

1. Other. One of the standard types is the “sundog.” In this a large luminous halo is seen 
around the sun with one to four images of the sun placed along the halo circle at intervals of 90 
degrees. Another report often has to do with a bright planet or even the moon shining through a 
light overcast. Mirages reflections are said to occur frequently when temperature inversions 
exists in the atmosphere. If an optical phenomena is suspected, routine check of the 
meteorological records should be made to establish whether such inversions existed. 


MJ-12 4838B 24 


TOP SECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


TOP SECRET/MAJIC EYES ONLY 


APPENDIX I 
REFERENCES 
For the availability of items listed, check SR 310-20-3, SR 310-20-4, SR 310-20-5 and SR 310- 
20-7. 
1. [Applicable] Regulations 
AR 380-4 Military security (Safeguarding Security In- 
formation). 
AR 750-4 Maintenance of Supplies and Equipment, Main- 
tenance Responsibilities and Shop Operation. 
2. Supply 
SR 725-405-5 Preparation and Submission of Requisitions for 
Supplies. 
3. Other Publications 
XX 219-20-3 Index of Training Manuals. 
XX 310-20-4 Index of Technical Manuals, Technical Regula- 
tions, Technical Bulletins, Supply Bulletin 
Lubrications Orders, and Modification Work 
Orders. 
XX 310-20-5 Index of Administrative Publications. 
XX 310-20-7 Index of Tables of Organization and Equipment, 
Reduction Tables, Tables of Organization, 
Tables of Equipment, Type Tables of Distri- 
bution and Tables of Allowance. 
4. Test Equipment References 
TM 11-664 Theory and Use of Electronic Test Equipment. 
5. Photographic References 
TM 11-404A Photographic Print Processing Unit 
AN/TFQ-9. 
TM 11-405 Processing Equipment PH-406. 
TM 11-401 Elements of Signal Photography. 
TM 11-2363 Darkroom PH-392. 
MJ-12 4838B 


TOP SECRET/MAJIC EYES ONLY 


REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


25 


TOP SECRET/MAJIC EYES ONLY 


Author Caveats 


This manual is a replica of one that was photographed by an unknown person. 


The Tri-X negatives were mailed to Mr. Don Berliner, postmarked March 7, 1994. Don 


provided copies to the GAO. He took early initiative to determine their authenticity. Presently 
in November 1998, although he has not been able to review the arguments summary, he is not 


inclined to regard SOM 1-01 as genuine. 


The 154 generation print copies became a basis for this replica. It is very accurate, and includes 
faithful replication of the few errors missed by the original proofreaders. Through page 21 was 
on the film, but pages 22-25 about the UFOB Guide were found in an unclassified FOIA released 
document provided to Mr. Brian Parks from Maxwell Air Force Base, referring to the transmittal 


of such a guide in an unclassified letter dated 14 Jan 1955. 


This manual SOM 1-01 is now in the public domain, having been largely reprinted in a book, 
“ТОР SECRET/MAJIC” by Mr. Stanton T. Friedman. That version, however, is incomplete, 
contains typesetting errors, and does not replicate the six by nine-inch format that was used. 


А number of arguments have been proposed to question the authenticity. It is the authors’ 
opinions that they have all been dealt with, and that there is no question at all that this is a 
genuine manual used for the purposes stated therein. 


These points of discussion will be treated in detail in an upcoming book by the authors noted 
below. 

О Robert M. Wood & Ryan S. Wood October 1998 

P.O. Box 2272, Redwood City, CA 94064-2272 


Email: drbobwood@aol.com & rswood@igc.apc.org 


MJ-12 4838B 


TOP SECRET/MAJIC EYES ONLY 
REPRODUCTION IN ANY FORM IS FORBIDDEN BY FEDERAL LAW 


26 


Jui TOP SECRET 


Шах А20707 5/4/54/050 


Oct 24 1952 


MEMORANDUM FOR: The Secretary of State 
The Secretary of Defense 


SUBJECT: Communications Intelligence Activities 


The communications intelligence (COMINT) activities of the United States 
are a national responsibility. They must be organized and managed as to 
exploit to the maximum the available resources in all participating departments 
and agencies and to satisfy the iegitimate intelligence requirements of all 
such departments and agencies. 


I therefore designate the Secretary of State and Defense as a Special 
Committee: of the National Security Council for COMINT, which Committee shall, 
with the assistance of the Director of Central Intelligence, establish policies 
governing COMINT activities, and keep me advised of such policies through the 
Executive Secretary of the National Security Council. 


I further designate the Department of Defense as executive agent of the 
Government, for the production of COMINT information. 


I direct this Special Committee to prepare and issue directives which 
вһа11 include the provisions set forth below and such other provisions as the 
Special Committee may determine to be necessary. 


1. A directive to the United States Communications Inteliigence Board 
(USCIB). This directive will replace the National Security Council 


Intelligence Directive No.9, and shall prescribe USCIB’s new 
composition, responsibilities and procedures in the COMINT fields. The 
directive shall include the following provisions: 


a. USCIB shall be reconstituted as a body acting for and under 
the Special Committee, and shall operate in accordance with the pro- 
visions of the new directive. Only those departments or agencies repre- 
sented in USCIB are authorized to engaged in COMINT activities. 


Downgraded per NSC Information Security Oversight 
Office, 28 Jan 1981 
NSA TS CONTL NO 7300405 


COPY NUMBER 2 
PAGE 7 ОҒ 8PAGES 
COPY 


TOP SECRET 


TOP SECRET 


COPY 


b. The Board shall be composed of the following members: 


(1) The Director of Central Intelligence, who shall be the 
Chairman of the Board. 


(2) A representative of the Secretary of State. 
(3) A representative of the Secretary of Defense. 


(4) A representative of the Director of the Federal 
Bureau of Investigation. 


(5) The Director of the National Security Agency. 

(6) A representative of the Department of the Army. 

(7) A representative of the Department of the Navy. 

(8) A representative of the Department of the Air Force. 
(9) A representative of the Central Intelligence Agency. 


c. Тһе Board shall have a staff headed by an executive secretary 
who shall be appointed by the Chairman with approval of the majority 
of the Board. 


d. It shall be the duty of the Board to advise and make recom- 
mendations to the Secretary of Defense, in accordance with the 
following procedure, with respect to any matter relating to 
communications intelligence which falls within the juristiction of the 
Director of NSA. 


(1) The Board shall reach its decision by a majority vote. 
Each member of the Board shall have one vote except the 
representatives of the Secretary of State and of Central Intelligence 
Agency who shall each have two votes. The Director of Central 
Intelligence, as Chairman, will have no vote. Іп the event that the 
Board votes and reaches a decision, any dissenting member of the 
Board may appeal from such decision written 7 days to the 


NSA TS CONTL. NO 7300405 
COPY NUMBER 2 
PAGE 2 ОҒ 8 PAGES 

COPY 


TOP SECRET 


TOP SECRET 


Special Committee. In the event that the Board votes but fails 
to reach a decision, any member of the Board may appeal within 

7 days to the Special Committee. In either event the Special 
Committee shall review the matter, and its determination thereon 
Shall be final. Appeals by the Director of NSA and/or the 
representatives of the Military Departments shall only be fiied 
with the approval of the Secretary of Defense. 


(2) If any matter is voted on by the Board but- 

fa) no decision is reached and any member files an appeal; 

(b) a decision is reached in which the representative 
of the Secretary of defense does not concur and files an appeal; 
no action shall be taken with respect to the subject matter until 
the appeal is decided, provided that, if the Secretary of Defense 
determines, after consultation with the Secretary of State, that 
the subject matter presents a problem of an emergency nature and 
requires immediate action, his decision shall govern, pending the 
result of the appeal. Іп such an emergency situation the appeal 
may be taken directly to the President. 


(3) Recommendations of the Board adopted in accordance with 
the foregoing procedures shall be binding on the Secretary of 
Defense. Except on matters which have been voted on by the 
Board, the Director of NSA shall discharge his responsibilities 
In accordance with his own judgement, subject to the direction 
Of the Secretary of Defense. 


(4) The Director of NSA shall make such report and furnish 
such information from time to time to the Board, either orally 


NSA TS CONTL. NO 7300405 
COPY NUMBER 2 
PAGE ЗОЕ 8PAGES 

COPY 


TOP SECRET 


TOP SECRET 


in writing, as the Board may request, and shall bring to the 
attention of the Board either such reports or otherwise any 
new major policies or programs in advance of their adoption by him. 


e. It shall also be the duty of the Board as to matters not falling 
within the jurisdiction of NSA; 


(1) To coordinate the communications intelligence activities 
among all departments and agencies authorized by the President 
to participate therein; 


(2) To initiate, to formulate policies concerning, and subject 
to the provisions of NSCID No.5, to supervise all arrangements 
with foreign governments in the field of communications intelligence; 
and 


(3) to consider and make recommendations concerning policies 
relating to communications intelligence of common interest to the 
departments and agencies, including security standards and procedures, 
and, for this purpose, to investigate and study the standards and 
practices of such departments and agencies in utilizing and 
protecting COMINT information. 


f. Any recommendation of the Board with respect to the matters 
described in paragraph e above shall be binding on ail departments or 
the members of the Board. Recommendations approved by a majority, but not 
all of the members of the Board shall be transmitted by it to the 
Special Cimmittee for such action as the Special Committee may see fit 
To take. 


g. The Board will meet monthly, or oftener at the call of the 
Chairman or any member, and shall determine its own procedures. 


NSA TS CONTL. МО 7300405 
COPY NUMBER 2 
PAGE 4OF 8 PAGES 

COPY 


TOP SECRET 


TOP SECRET 


2. A directive to the Secretary of Defense. This directive shall 
Include the following provisions. 


a. Subject to the specific provisions of this directive, the 
Secretary of Defense may delegate in whole or in part authority over 
The Director of NSA within his department as he sees fit. 


b. Тһе COMINT mission of the National Security Agency (NSA) shall 
Be to provide an effective, unified organization and control of the 
communications intelligence activities of the United States conducted 
against foreign governments, to provide for integrated operational 
policies and procedures pertaining thereto. As used in this directive, 
the terms “communications intelligence: or “СОМТНТ” shall be construed 
all procedures and methods used in the interception of communications 
other than foreign press and propaganda broadcasts and the intended 
recipients,* but shall include censorship and the production and 
dissemination of finished intelligence. 


C. NSA shall be administrated by a Director, designated by the 
Secretary of Defense after consultation with the Joint Chiefs of Staff, 
who shall serve for a minimum term of 4 years and who shall be eligibie 
for reappointment. The Director shall be a career commissioned officer 
of the armed services on active or reactivated status, and shall enjoy 
at least 3 star rank during the period of his incumbancy. 


d. Under the Secretary of Defense, and in accordance with approved 
policies of USCIB, the Director of NSA shall be responsible for 
accompiishing 


e See Public Law 513- -817“ Congress 1950. 


TOP SECRET 


TOP SECRET 


COPY 


the mission of the NSA. For this purpose all COMINT collection and 
production resources of the United States are place under his 
operational and technical control. When action by the Chiefs of 

the operating agencies of the Services or civiiian departments or 
agencies is required, the Director shall normally issue instructions 
pertaining to COMINT operations through them. However, due to the 
unique technical character of COMINT operations, the Director is 
authorized to issue direct to any operating elements under his 
operational control task assignments and pertinent instructions which 
are within the capacity of such elements to accomplish. He shall 
also have direct access to, and direct communication with, any 
elements of the service or civilian COMINT agencies on any other 
matters of operational and technical control as may be necessary, and 
he is authorized to obtain such information and intelligence material 
from them as he may require. All instructions issued by the Director 
under the authority provided in this paragraph shall be mandatory, 
subject only to appeal to the Secretary of Defense by the Chief of 
Service or head of civilian department or agency concerned. 


e. Specific responsibilities of the Director of NSA include the 
following: 


(1) Formulating necessary operational plans and policies for 
the conduct of the U.S. COMINT activities. 


(2) Conducting COMINT activities, including research and 
development, as required to meet the needs of the departments 
and agencies which are authorized to receive the products of COMINT. 


NSA CONTL. NO 7300405 
COPY NUMBER 2 
PAGE 6 ОҒ 8PAGES 


6 


TOP SECRET 


TOP SECRET 


COPY 


(3) Determining; and submitting to appropriate authorities, 
Requirements for logistic support for the conduct of COMINT 
activities, together with specific recommendations as to what 
each of the responsible departments and agencies of the 
Government should apply. 


(4) Within NSA's field of authorized operations prescribing 
requisite security regulations covering operating practices, 
including the transmission, handling and distribution of COMINT 
material within and among the COMINT elements under his operational 
or technical contro[1]; and exercising the necessary monitoring and 
supervising control, including inspections if necessary, to ensure 
compliance with the regulations. 


(5) Subject to the authorities granted the Director of 
Central Intelligence under NSCID No.5, conducting all iiaison 
on COMINT matters with foreign governmental communications 
intelligence agencies. 


f. То the extent he deemd feasible and in consonance with the 
aims of maximizing over-all efficiency, economy, and effectiveness, the 
Director shall centralize or consolidate the performance of COMINT 
functions for which he is responsible. ТЕ is recognized that in 
certain circumstances elements of the Armed Forces and other agencies 
being served will require close COMINT support. Where necessary for 
this close support, direct operational control of specified COMINT 
facilities and resources will be delegated by the Director, during 
such periods and for such tasks as are determined by him, to military 
commanders or the Chiefs of other agencies supported. 


NSA CONTL. NO 7300405 
COPY NUMBER 2 | 
PAGE 7 OF 8 PAGES 


COPY 


TOP SECRET 


TOP SECRET 


g. The Director shall exercise such administrative control over 
COMINT activities as he deems necessary to the effective/perfomance 
of his mission. Otherwise, administrative control of personnel and 
facilities will remain with the departments and agencies providing 
them. 


COPY 


h. The Director shall make provision for participation by 
representatives of each of the departments and agencies eligible to 
receive COMINT products in those offices of NSA where priorities of 
intercept and processing are finally planned. 


i. The Director shall have a civilian deputy whose primary 
responsibility shall be to ensure the mobilization and effective 
employment of the best available human and scientific resources in 
the field of cryptologic research and development. 


j- Nothing in this directive shall contravene the responsi- 
bilities of the individual departments and agencies for the final 
evaluation of COMINT information, its synthesis with information 
from other sources, and the dissemination of finished intelligence 
to users. 


3. The special nature of COMINT activities requires that they 
be treated in all respects as being outside the framework of the general 
intelligence activities. Orders, directives, policies, or recommendations of 
any authority of the Executive Branch relating to the collection, production, 
security, handling, dissemination, utilization of intelligence, and/or 
Classified material, shall not be applicable to COMINT activities, unless 
specifically so stated and issued by component departments or agency authority 
represented on the Board. Other National Security Council Intelligence 
Directives to the Director of Central Intelligence shall be construed as 
non-applicable to COMINT activities, unless the National Security Council has 


made its directive specifically applicable to COMINT. NSA CONTRL. NO. 7200405 
COPY NUMBER 2 


PAGE 8 OF 8PAGES 
/s/ HARRY S. TRUMAN 


TOP SECRET 


eerie ра 5 


ха Uniled Safes Senate ° 


August 29, 1975 


Theodore P. Rosack 
Special Agent In Charge 
Denver Federal Building 
1961 Stout Street 
Denver, Colorado 80202 


Dear Mr. Rosack: 


For several months my office has been receiving reports of cattle 
mutilations throughout Colorado and other western states. At least 130 
cases in Colorado alone have been reported to local officials and the 
Colorado Bureau of Investigation (C81); the CBI has verified that the 
fncidents have occured for the last two years in nine states. 


The ranchers and rural residents of Colorado are concerned and 
frightened by these incidents. Тһе bizarre mutilations are frightening 
in themselves: in virtually all the cases, the left ear, left eye, rectum 
and sex organ of each animal has been cut away and the blood drained from 
the carcass, but with no traces of blood left on the ground and no foot- 
prints. 


In Colorado's Morgan County area, there has also beei reports that 
а helicopter was used by those who mutilated the carcasses of the cattle, 
and several persons have reported being chased by a similar helicopter. 


Because I am gravely concerned by this situation, I am asking that 
the Federal Bureau of Investigation enter the case. Although the CBI 
has been investigating the incidents, and local officials also have been 
involved, the lack of a central unified direction has frustrated the fn- 
vestigation. It seems to have progressed little, except for the 
recognition at long last that the incidents must be taken seriously. 


Ком 16 appears that ranchers are arming thenselves to protect their 
Livestock, as well as their families and themselves, because they are 
frustrated by the unsuccessful investigation. Clearly something must be 
done before someone gets hurt. 


HERE IS SOMETHING IMPORTANT. 
There are reports of deaf people, that was being yelled at, 
by angry voices, inside of their own minds, on the totally wrong language. 
Like English, but Arab. 
THEY were accidently hit with AUDIO that was not meant to be within THEM at all. 


THE WHOLE SHO-BANG IN THEIR HEADS WAS MADE FOR SOME 'FOLKS' ELSEWHERE. 
But apparently, there are something called 'making no sounds at all in the deaf people technology'. 


You know, deaf people, people who can not hear, 
they read lips, when talked to. 
And they did not recognize this speech. 
The whole shit was made for another Planet, completely. 


THAT'S THE SHIT. 'SIR. 


Let me repeat myself: 
They did not recognize this speech. 
Some of them are not deaf from birth, but still remembers conversations. 
This Branch of Deaf People are harder to fuck around with. They all had perfect hearing recently. 
The whole shit was made for another Planet, completely. 


When? About 15 years ago. 2005-2007 somewhere. | read some Swedish newspaper writing about it. 
And I picked it up again, a second time, when making languageschools for Political Avenue dot com. Category SIGN LANGUAGE. 
I don't shit you. This happened. // С.М. 


в 


HERE ARE SOME TERMS AND ABBS YOU NEED TO KNOW ABOUT BEFORE READING CLASSIFIED DOCUMENTS. 
BELOW ARE THE MOST COMMON DOCUMENT OR PROJECTION SLIDE SECRET CLASSIFICATION LABELS, 
THAT YOU WILL FIND IN THE RESTRICTED PDF DOCUMENTS: 


DTRA = Defense Threat Reduction Agency. CIA - Central Intelligence Agency. 
Electromagnetic Pulse. 000 - Department of Defense. 
Executive Order. FBI - Federal Bureau of Investigation. 
For Official Use Only. FOIA - Freedom of Information Act. 
In Accordance With. RAAF - Roswell Army Air Field. 
Information Security Oversight Office. 

Joint Publication. 

Mission Critical System. 

Militarily Critical Technologies List. 

Mission-Oriented Protective Posture. 

OPR = Office of Primary Responsibility. 

SCG = Security Classification Guide. 


к 
п 
е 
5 . 
E ow N W WW NOM NW и 


EYES ONLY =PRESIDENT LEVEL. TWO POINTS ABOVE TOP SECRET. THIS CLASSIFICATION SEEMS ТО BE FORGOTTEN OR NOT USED FOR A LONG TIME. 

TS =TOP SECRET. 

NOFORN =NO FOREIGNERS. MOSTLY MEANS WHEN USA DENIES ALLIES LIKE UNITED KINGDOM ANY KNOWLEDGE OR INFORMATION. 

_ SI =INFORMATION CLASSED AS SPECIAL INTELLIGENCE. ONE SECRECY POINT ABOVE TOP SECRET AND MORE RARE ТО BE APPROVED OF. 

SG! =SPECIAL COMPARTMENTED INFORMATION. —НЕКЕ IS WHERE THE GOOD STUFF GETS HIDDEN. 

^U: = Controlled Unclassified Information. Here it gets a little tricky. 

DoD = Department of Defense. 

DD Form = »Department of Defense Form (to fill in or check). 

DoDD = Department of Defense Directive. 

пой! = Department of Defense Instruction. 

DoD = Department of Defense Manual. 

EVEY =ONLY MEANT FOR THE FIVE EYES (SPYRING). They are the USA/UNITED KINGDOM/AUSTRALIA/NEW ZEALAND/CANADA. 

OASD(NCE/CE) = Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense Programs. 

ORCON = ORIGINATOR CONTROLLED. Only the ORIGINATOR may release the information. 

S zSECRET INFORMATION. A LEVEL OF CLASSIFICATION OFTEN USED IN MILITARY PAPERS AND DOCUMENTS. 

и zUNCLASSIFIED INFORMATION. YOU CAN SPEAK FREELY ABOUT THIS. 

SS© =SPECIAL SOURCE OPERATIONS. 

ГООО or CONFIDENTIAL Е FOR OFFICIAL USE ONLY . THE DOCUMENT CONTAINS GOVERNMENT INFORMATION THAT SHOULD NOT BE RELEASED TO THE PUBLIC. 
SIGINT SIGNALS INTELLIGENCE. TRACKS INTERNET, RADIO TRANSMISSIONS, COMMUNICATIONS, GPS LOCATIONS, INDIVIDUAL PERSONS TRACKING ET CETERA. 
SIGAD =SIGINT ACTIVITY DESIGNATOR. Determines the collection sources used, taken from within the produced information chain. 

СОМІМТ =COMINT is the Communication Intelligence part of SIGINT (Signals Intelligence), dedicated to Electronic Warfare Operations. 

SC =SECRET CODEWORD. 

TSC =TOP SECRET CODEWORD. 

COMIN T CODEWORD =A FIVELETTER WORD THAT PRIMARILY IDENTIFIES THE SOURCE OF THE COMINT INFORMATION THAT WAS КЕГАУЕО OR DOCUMENTED. 
ОМЕНА ШЕ USED TOGETHER WITH ` ` IN A DOCUMENT - IT'S THE FIVELETTER CODEWORD THAT IDENTIFIES THE COMINT INFORMATION AS THE HIGHEST - CLASS 3. 
202277 = The Chairman of the Joint Chiefs of Staff Manual. 

СОД = Course of Action. 

ССО =HANDLE МА COMINT CHANNELS ONLY . INFORMATION ONLY FOR PEOPLE WHO HAVE ACCESS TO READ COMINT MESSAGES AND DOCUMENTS NORMALLY. 
PAPERTRAILS SOMETHING YOU CAN GET RID OF. PAPERS THAT POINT TO THAT YOU WERE A CRIMINAL WHEN AT WORK. I.E. —THE USE OF PAPER SHREDDERS. 
СОВ =A PERSON YOU CAN NOT GET RID ОҒ. Many have tried. We advice not to try again. —Don't fuck with the Almighty. Or His Universe. 


—Why are anyone interested іп you? Or in your communications? 


Why would anyone attack your computer or smartphone? 
Half world control, half target practice. 


Otherwise one do not have world control . 


File name: 
File size: 


Title: 


Creation Date: 
Modification Date: 
Creator: 


PDF Producer: 


PDF Version: 


Page Count: 


Page Size: 


Fast Web View: 


heavy-national-security.pdf 
105 MB (110,503,114 bytes) 


© SWEDISH DEEP INVESTIGATION 
REPORT. *** MADE AND PRODUCED BY 
GUSTAV NORSTROM DATE 2023-03-19. 
Working on the behalf of the Royal 
Kingdom of Sweden. // Just type 
www.hemligadokument.com in your 
address bar and you will get this PDF in 
the latest updated version via fully 
automated server. (Servername: 
goodeveningexpress.com) 


GN - TELEPHONE: «00 46 073 970 2600. 


Update on U.S.A. Government and 
Extraterrestrials in the 1950's . 


biohazard bioweapon bioweapons NTTR 
extraterrestrial extraterrestrials alien aliens 
ufo ufob Roswell MJ12 MJ-12 USA S4 
AREA 51 Sweden Swedish Government 
Sverige Hemliga Dokument utomjordingar 
gustav norstrom restricted documents 
important 

3/19/2023, 12:57:00 PM 

3/19/2023, 12:57:00 PM 


GUSTAV NORSTROM, SWEDEN. 
TELEPHONE: 00 46 073 970 26 00. *** 
ADDRESS HEDEN 132, 82131 BOLLNAS, 
SWEDEN. Working on the behalf of the 
Royal Kingdom of Sweden 


© SWEDISH DEEP INVESTIGATION REPORT 
-- MADE AND PRODUCED BY GUSTAV 
NORSTROM DATE 2023-03-19. Working on 
the behalf of the Royal Kingdom of 
Sweden for Governments worldwide. 

1.7 

622 


436.5 x 170.4 mm (landscape) 


INTRODUCTION. 
14 - START READING RIGHT HERE. 


PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 
PAGE 


15 
16 
17 


126 
127 
146 
150 
154 
157 
159 
294 
300 
303 
315 
325 
327 
329 
330 
341 
361 
371 
374 
464 
504 
508 
528 
530 
574 
576 
581 


EXTRAS: 


PAGE 
PAGE 


FHH 


583 
612 


THE ROSWELL COVER-UP PART 2. PART ONE CAN BE READ LATER IN THIS DOCUMENT. 

ROSWELL NEWSPAPER FRONTPAGE FROM 08 JULY 1947. 

PHOTOGRAPHS OF EXRATERRESTRIAL (E.T.) DEAD BODY ON AMERICAN MILITARY AUTOPSY TABLE. 3 PHOTOS INCLUDING ONE ON IT'S BRAIN. 

NEWLY ELECTED PRESIDENTS UFO BRIEFING DOCUMENTS FROM 18 NOVEMBER 1952. PAGE 20-26. *** 

SHORT DESCRIPTIONS AND MY OWN PERSONAL PHOTOS OF DWIGHT D. EISENHOWER, HARRY S. TRUMAN, VANNEVAR BUSH, JAMES FORRESTAL AND MJ-1 HILLENKOETTER. 

TAGGED AND BROKEN I-BEAM OF EXTRATERRESTRIAL UNKNOWN MATERIAL WITH HIEROGLYPHS. THE I-BEAM HAS A LIGHT-PURPLE COLOR. 

DEAD ALIEN ON AUTOPSY TABLE. 

THE REAL USA GOVERNMENT COUNTERSTRIKE UFO MANUAL - "EXTRATERRESTRIAL ENTITIES AND TECHNOLOGY, RECOVERY AND DISPOSAL" - PRINTED 1954. AND LAST EDIT IN IT ARE FROM 1957. *** 
ALIEN INSCRIPTIONS - SKETCH MADE BY JESSE MARCEL JUNIOR IN 1989 SHOWING THE ENGRAVED SYMBOLS FROM A SPACESHIP I-BEAM. 

ALIEN INSCRIPTIONS - HAVE THE ROSWELL U.F.O. DEBRIS SYMBOLS BEEN DECIPHERED. SHORT BACKGROUND. 

ALIEN INSCRIPTIONS - NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS WHEN A U.S. ARMY OFFICER HOLDS THE I-BEAM. 

ALIEN INSCRIPTIONS - NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS THE I-BEAM WITH IT'S CORRECT ITEM TAG. 

NEW PHOTO FROM THE U.S. MILITARY ARCHIVES THAT SHOWS SPACESHIP CONTROLS FOR 6-FINGER HANDS. 

INFORMATION ON THE AREA 51 S4 FACILITY BASED ON 3 PERSONS WHO CLAIMS THAT THEY HAVE WORKED THERE. 

INFORMATION ON THE DULCE MILITARY DNA FACILITY THAT CROSSBREEDS ANIMALS AND HUMANS. BASED MOSTLY ON 2 PERSONS WHO HAVE CLAIMED TO WORKED THERE. ONE HAS GONE MISSING INCLUDING HIS WHOLE FAMILY. 
THE PHOTO SECTION IN THIS SWEDISH REPORT. SEE THE FIRST PHOTO OF A 6-FINGERED EXTRATERRESTRIAL INDIVIDUAL. 

HOW CAN YOU PLACE "AN OBJECT OR FLUID ON THE OTHER SIDE" - AND EXACTLY WHAT IS "THE SNAKE" MENTIONED IN THE HOLY BIBLE, OR "THE SERPENTS" ANCIENT CIVILISATIONS SPOKE OF. 
THE PHOTO SECTION CONTINUES WITH MORE PHOTO'S, MAPS, SATELLITE IMAGES AND TECHNICAL DATA. THE FIRST IMAGE SHOWS A CUBAN AIRPORT WITH ALIEN SPACESHIP LANDING MARKINGS. 
ROSWELL DISPATCH NEWSPAPER FRONTPAGE FROM 09 JULY 1947. 

EXTRATERRESTRIAL ALIEN POETRY AND WISDOM. 

PHOTO OF SOME KIND OF "E.T. WEAPON". Obviously, one can determine that the electric lighting comes from the beam pointed down. The picture is real and not photoshopped. 
DIFFERENT RADAR DESCRIPTIONS. PRIMARY AND SECONDARY RADAR SCREENS. 

UNITED STATES PATENTS ABOUT BRAINWAVES AND REMOTE ANTENNA MINDCONTROL. 

UNITED STATES ACTIVE DENIAL TRUCKS. PUBLIC EXPLANATION ARE BURNING SKIN GROUP CONTROL. BUT ACTIVE DENIAL CAN SUPPRESS THOUGHTS SO SOME DECISIONS BECOME IMPOSSIBLE TO PERFORM. 
OUR OWN FEDERAL AVIATION ADMINISTRATIONS AIR TRAFFIC SURVEILLANCE - THAT E.T. TAPPED IN TO, OR HAVE SYSTEM ACCESS TO. THEY KNOW WHERE ALL OUR AIRCRAFT ARE - WHEN FAKING A AIRPORT. 
RADIO AND ELECTRO MAGNETIC RADIATION SAFETY LEVELS. 

EMF AND RF SAFETY LEVELS - A COMPARATIVE GUIDE. 

NOT FOR PUBLIC INSPECTION. ONE PAGE DOCUMENT FRAGMENT. 

TWO PAGE DOCUMENT THAT MENTION PROFESSOR ALBERT EINSTEIN AS THE PROJECT JEHOVA DIRECTOR. [Document found in John Foster Dulles security safe. ] 

PHOTO OF JOHN FOSTER DULLES. [He served as United States Secretary of State under President Eisenhower 1953-1959.] 

CLEAN WRITING OF THE ABOVE TWO PAGE DOCUMENT. [Document from above that was found in John Foster Dulles security safe, now with clean text, and easier to read. ] 

MJ-12 TOP SECRET/MAJESTIC / THE FIFTH ANNUAL REPORT END CONCLUSION. THE REPORT ARE REAL U.S. GOVERNMENT PROPERTY. *** 

U.S. PATENT - APPARATUS FOR AUDIBLY COMMUNICATING SPEECH USING THE RADIO FREQUENCY HEARING EFFECT. 

WHAT ARE THE EXTRATERRESTRIALS DOING HERE *EXACTLY*. HERE IS A SHORT SUMMARY. THIS IS WHAT THEY DO, IF, THEY, THEORETICALLY, EXIST. 

PENTAGON AND THE U.S.A. DEFENSE BUDGET 2017-2018. INCLUDES DESCRIPTIONS OF ALMOST ALL WEAPON SYSTEMS AND THE AIR FORCE ONE. 

THE NSA COMPUTER NETWORK SECURITY GUIDE. MOST NSA SPY SERVERS ARE LISTED WITH THEIR OPERATING TCP/UDP PORTS. READ WHAT THE NATIONAL SECURITY AGENCY SAY YOU SHOULD BLOCK. 
CIA AND THE HAVANA SYNDROME. 

NEW PHOTO SECTION: MORE AREA 51 PHOTOS. 

TWICE THE SPEED OF LIGHT. 

ALL USA INTELLIGENCE AGENCIES BLACK BUDGETS 2013. 

BOKSTAVERINGSALFABETET. SWEDISH AND INTERNATIONAL. 

PHOTO ON U.F.O. CHASED BY THE U.S. MILITARY. 

AUTHORS IDENTIFICATION. 


CLEAN WRITING OF THE MJ-12 MANUAL. THESE PAGES ARE EASIER TO READ. 
A DIRECTIVE TO THE UNITED STATES COMMUNICATIONS AND INTELLIGENCE BOARD (USCIB). SUBJECT: COMMUNICATIONS INTELLIGENCE ACTIVITIES. WRITTEN 24:TH OCTOBER 1952. *** 


GO BACK TO PAGE 97 - AND IN THE PHOTO SECTION OF THIS REPORT // SEE THE DOCUMENT ABOUT MURDERING SECRETARY OF DEFENSE FORRESTAL THAT WISHED TO GO PUBLIC WITH U.F.O. 


First he was placed in a mental hospital, and then he was thrown out of a window there. 


Did they give him a poison before he went to the mental hospital? 


All pictures are real and not photoshopped. There are more than 100 photos and images herein. 


© SWEDISH DEEP INVESTIGATION MADE AND PRODUCED BY GUSTAV NORSTRÓM DATE 2023-03-24. 
Working on behalf of the Royal Kingdom of Sweden for all Governments worldwide. 


*** = ALL THE 1950"5 DOCUMENTS INDEXED ABOVE ARE REAL U.S. GOVERNMENT PROPERTY. 

I don't personally speculate in this REPORT, about the accuracy and written truths served to you from these 1950's documents. 

I only guarantee you that the old external documents published herein this SWEDISH PDF REPORT, are real U.S. GOVERNMENT PROPERTY from the 1950's. 
Educate yourself by reading these GOVERNMENT PAPERS. 


Our governments are our neighbors, but our neighbor does not tell us everything, and often deceives us. 


| made some damn PDF about space and the moon, but іп my 
factfinding, | got really stuck on some stuff. A mouse that looks like а 
frog. Mutilated cows. Genitalia and eyes removed. Is there any 
background to all that? And then you find a military lab down in a 
mountain range where they are working on DNA. Right next to the 


field where a State Trooper, (Traffic Police we should have said), 
anyway, he, found а cow with a "calf" inside, which looked like a frog, a 
fish and a human. And this within 10 miles of the DNA military lab in 
the mountain. Is it that simple? 

IT FUCKING LOOKS LIKE IT. " / Gustav Norstróm. 


Modell: 5 
Polisbil 2020 SAPO. ус 


Skrämljus med sidriktad 
vit trottoarbelysning 
från STANDBY. 


nt 
М” 


FORSTARKNINGSVAPEN | l 


| VÀRA PASSAGERARE | E SAKERHETS- 
| VISTAS BAKOM | 22223 
\ DENNA BILDORR. TT 


\ Kontakta Polisen pa nummer 112. SWEDISH 
\ For Police please dial number 112. SECURITY 
| POLICE 


SKRAMSELEFFEKT: X X X X Xv FEM STJÄRNOR AV FEM MÖJLIGA. 


Jag frágade еп Це): Tank om SAPO stannade utanfér er villa och tog med sig din kille. 
Fattaru vilken skillnad det àr om en vanlig civilpolisbil stannar eller om det àr den hàr 
fräna versionen? "-Dà blir man ju skraj sa hon. Om man ser den dar jävla bilen!” 

Det аг meningen ocksa sa jag. Eller sa star man utanfór den Kinesiska Ambassaden, 


OCH BARA BLINKAR LITE EN STUND. 


VAD TYX OM BILEN? 


Jag satt någon helg för två ar sedan med еп dyr flaska rödvin och en dator, och gjorde bilen ovan. 
Мағ jag tanker efter sa var det kanske 2-3 flaskor ródvin och lite tabletter. Lite patand sa dar. 
DET AR KANSKE 3 AR SEDAN OCH FEM FLASKOR RÓDVIN. ELLER NYINKÓPT HANDSPRIT MED COCA-COLA. 


SAME SHIT! 


KOLLA GALLREN РА PASSAGERARSIDAN BADE FRAMAT OCH ВАКАТ. KAN INTE SAPO AKA RUNT JAMNT 
I STOCKHOLM, MED DEN HAR BILEN, OCH HA FORSTARKNINGSVAPEN TILL ALLA I LADORNA DAR BAK. 


Fotar man dessutom personer fran den har bilen, sa sátter man ju nojor i huvudet 
pa dem som man fotar av. DET AR DET SOM AR AVSIKTEN ! 


SA DE GOR BORT SIG SENARE PGA NOJOR. 


AV: 740621-1750 


VIDEOLINKS 


The link address to the U.S. MILITARY FOOTAGE ARCHIVE FILMS saved on website. 
You can also listen to the original audio from the ABC RADIO NATIONWIDE 
Newsflash the 8:th of July 1947. 
https://restricteddocuments.com/NEWSFLASH.mp4 

Chemtrails Video. It's not about one picture, which might be explainable, 


but the amount of images, which needs another Government answer. 


https://restricteddocuments.com/Emergency-BroadcastSWEDEN1.mp4 


Federal Reserve. It's about cash. 


https://restricteddocuments.com/FIRST%2@LOOK%20insidex2ethe%2OF EDERAL%Z2ZORESERVE% 
2028.04.2013%20 Full%2@Lenght_.mp4 


Sida 1